Korean
<< Back
VID 25219
Severity 30
Port 3306
Protocol TCP
Class DB
Detailed Description The version of MariaDB running on the remote host is 10.2.x prior to 10.2.3. It is, therefore, affected by multiple vulnerabilities :

- A denial of service vulnerability exists in the trx_state_eq() function due to improper handling of state errors.

- A denial of service vulnerability exists in the lock_rec_queue_validate() function in lock/lock0lock.cc due to improper handling of lock requests.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation.

- A denial of service vulnerability exists in the check_contains() function in sql/item_jsonfunc.cc due to improper handling of a specially crafted array.

- A denial of service vulnerability exists in the init_ror_merged_scan() function in sql/opt_range.cc due to improper handling a specially crafted table column

- A denial of service vulnerability exists in the val_str() function in sql/item_jsonfunc.cc due to improper handling of scalar values.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON_VALID selections.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON arrays.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON_VALID selections.

- A denial of service vulnerability exists in the fix_length_and_dec() function in sql/item_jsonfunc.cc due to improper handling of JSON casting.

- A denial of service vulnerability exists in the fparse_one_or_all() function in sql/item_jsonfunc.cc due to improper handling of input passed via the 'one_or_all' parameter.

- A denial of service vulnerability exists in the val_str() function in sql/item_jsonfunc.cc due to improper handling of value_length

- A denial of service vulnerability exists in the trx_state_eq() function due to improper handling of state errors.

- A denial of service vulnerability exists in the lock_rec_queue_validate() function in lock/lock0lock.cc due to improper handling of lock requests.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation.

- A denial of service vulnerability exists in the check_contains() function in sql/item_jsonfunc.cc due to improper handling of a specially crafted array.

- A denial of service vulnerability exists in the init_ror_merged_scan() function in sql/opt_range.cc due to improper handling a specially crafted table column.

- A denial of service vulnerability exists in the val_str() function in sql/item_jsonfunc.cc due to improper handling of scalar values.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON_VALID selections.

* Note: This check solely relied on the banner of the remote MariaDB server to assess this vulnerability, so this might be a false positive.

* References:
https://mariadb.com/kb/en/mariadb/mariadb-1023-changelog/
https://mariadb.com/kb/en/mariadb/mariadb-1023-release-notes/

* Platforms Affected:
MariaDB versio
Recommendation Upgrade to the latest version of MariaDB (10.2.3 or later), available from the MariaDB Web site at https://downloads.mariadb.org/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)