Korean
<< Back
VID 25217
Severity 30
Port 3306
Protocol TCP
Class DB
Detailed Description The version of MariaDB running on the remote host is 10.0.x prior to 10.0.29. It is, therefore, affected by multiple vulnerabilities :

- A privilege escalation vulnerability exists in scripts/mysqld_safe.sh due to improper handling of arguments to malloc-lib. A local attacker can exploit this, via a symlink attack on error logs, to gain root privileges. (CVE-2016-6664)

- A denial of service vulnerability exists in the check_duplicate_key() function due to improper handling of error messages. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the destroy() function in sql/sql_select.cc due to improper handling of a specially crafted query. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.

* Note: This check solely relied on the banner of the remote MariaDB server to assess this vulnerability, so this might be a false positive.

* References:
https://mariadb.com/kb/en/mariadb/mariadb-10029-changelog/
https://mariadb.com/kb/en/mariadb/mariadb-10029-release-notes/

* Platforms Affected:
MariaDB versions 10.0.x prior to 10.0.29
Any operating system Any version
Recommendation Upgrade to the latest version of MariaDB (10.0.29 or later), available from the MariaDB Web site at https://downloads.mariadb.org/
Related URL CVE-2016-6664 (CVE)
Related URL 93612 (SecurityFocus)
Related URL (ISS)