VID |
25220 |
Severity |
30 |
Port |
3306 |
Protocol |
TCP |
Class |
DB |
Detailed Description |
The version of MariaDB running on the remote host is 5.5.x prior to 5.5.54. It is, therefore, affected by multiple vulnerabilities :
- A privilege escalation vulnerability exists in scripts/mysqld_safe.sh due to improper handling of arguments to malloc-lib. A local attacker can exploit this, via a symlink attack on error logs, to gain root privileges. (CVE-2016-6664)
- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.
- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.
- A denial of service vulnerability exists in the parse_filter_rule() function in sql/rpl_filter.cc that is triggered during the clearing of wildcards. An authenticated, remote attacker can exploit this to crash the database.
- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.
- A denial of service vulnerability exists in the st_select_lex::is_merged_child_of() function in sql/sql_lex.cc due to improper handling of merged views or derived tables. An authenticated, remote attacker can exploit this to crash the database.
- A denial of service vulnerability exists in sql/item.cc due to improper handling of a specially crafted subquery. An authenticated, remote attacker can exploit this to crash the database.
* Note: This check solely relied on the banner of the remote MariaDB server to assess this vulnerability, so this might be a false positive.
* References: https://mariadb.com/kb/en/mariadb/mariadb-5554-release-notes/ https://mariadb.com/kb/en/mariadb-5554-changelog/
* Platforms Affected: MariaDB versions 5.5.x prior to 5.5.54 Any operating system Any version |
Recommendation |
Upgrade to the latest version of MariaDB (5.5.54 or later), available from the MariaDB Web site at https://downloads.mariadb.org/ |
Related URL |
CVE-2016-6664 (CVE) |
Related URL |
93612 (SecurityFocus) |
Related URL |
(ISS) |
|