Korean
<< Back
VID 25218
Severity 30
Port 3306
Protocol TCP
Class DB
Detailed Description The version of MariaDB running on the remote host is 10.1.x prior to 10.1.20. It is, therefore, affected by multiple vulnerabilities :

- A denial of service vulnerability exists in the trx_state_eq() function due to improper handling of state errors. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_duplicate_key() function due to improper handling of error messages. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_rec_queue_validate() function in lock/lock0lock.cc due to improper handling of lock requests. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the destroy() function in sql/sql_select.cc due to improper handling of a specially crafted query. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the calculate_cond_selectivity_for_table() function in sql/opt_range.cc due to improper handling of 'thd->no_errors'. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/statistics.cc due o improper handling of stat tables. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the parse_filter_rule() function in sql/rpl_filter.cc that is triggered during the clearing of wildcards. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_reset_lock_and_trx_wait() function instorage/innobase/lock/lock0lock.cc due to improper handling of NULL values in wait_lock. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.

* Note: This check solely relied on the banner of the remote MariaDB server to assess this vulnerability, so this might be a false positive.

* References:
https://mariadb.com/kb/en/mariadb/mariadb-10120-changelog/
https://mariadb.com/kb/en/mariadb/mariadb-10120-release-notes/

* Platforms Affected:
MariaDB versions 10.1.x prior to 10.1.20
Any operating system Any version
Recommendation Upgrade to the latest version of MariaDB (10.1.20 or later), available from the MariaDB Web site at https://downloads.mariadb.org/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)