VID |
25186 |
Severity |
30 |
Port |
3306 |
Protocol |
TCP |
Class |
DB |
Detailed Description |
The version of MariaDB running on the remote host is 10.1.x prior to 10.1.14. It is, therefore, affected by multiple vulnerabilities :
- An unspecified flaw exists in sql_insert.cc that is triggered during the handling of INSERT or REPLACE DELAYED statements. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition. (VulnDB 138174)
- A flaw exists in the Item_func_match::fix_index() function within file sql/item_func.cc due to improper handling of a full-text search of the utf8mb4 column. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition. (VulnDB 140239)
* Note: This check solely relied on the banner of the remote MariaDB server to assess this vulnerability, so this might be a false positive.
* References: https://mariadb.org/mariadb-10-1-14-connectorj-1-4-4-now-available/ https://mariadb.com/kb/en/mariadb/mariadb-10114-changelog/ https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/ https://jira.mariadb.org/browse/MDEV-9986
* Platforms Affected: MariaDB versions 10.1.x prior to 10.1.14 Any operating system Any version |
Recommendation |
Upgrade to the latest version of MariaDB (10.1.14 or later), available from the MariaDB Web site at https://downloads.mariadb.org/ |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|