Synopsis
The remote FreeBSD host is missing one or more security-related updates.
Description
The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the ff5606f7-8a45-11ec-8be6-d4c9ef517024 advisory.
- MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
(CVE-2021-46663)
- MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW. (CVE-2021-46659)
- This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB.
Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
(CVE-2022-24048)
- This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB.
Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207. (CVE-2022-24050)
- This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB.
Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193. (CVE-2022-24051)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: freebsd_pkg_ff5606f78a4511ec8be6d4c9ef517024.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:freebsd:freebsd:mariadb103-client, p-cpe:/a:freebsd:freebsd:mariadb103-server, p-cpe:/a:freebsd:freebsd:mariadb104-client, p-cpe:/a:freebsd:freebsd:mariadb104-server, p-cpe:/a:freebsd:freebsd:mariadb105-client, p-cpe:/a:freebsd:freebsd:mariadb105-server, cpe:/o:freebsd:freebsd
Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info
Exploit Ease: Exploits are available
Patch Publication Date: 2/10/2022
Vulnerability Publication Date: 1/29/2022