RHEL 6 / 7 : rh-mariadb100-mariadb (RHSA-2016:1132)

critical Nessus Plugin ID 193833

Synopsis

The remote Red Hat host is missing one or more security updates for rh-mariadb100-mariadb.

Description

The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2016:1132 advisory.

- pcre: buffer overflow caused by recursive back reference by name within certain group (8.38/4) (CVE-2015-3210, CVE-2015-8384)

- pcre: stack overflow caused by mishandled group empty match (8.38/11) (CVE-2015-3217)

- mysql: unspecified vulnerability related to Server:Partition (CPU October 2015) (CVE-2015-4792, CVE-2015-4802)

- mysql: unspecified vulnerability related to Server:DDL (CPU October 2015) (CVE-2015-4815)

- mysql: unspecified vulnerability related to Server:InnoDB (CPU October 2015) (CVE-2015-4816, CVE-2015-4861, CVE-2015-4895)

- mysql: unspecified vulnerability related to Client programs (CPU October 2015) (CVE-2015-4819)

- mysql: unspecified vulnerability related to Server:Types (CPU October 2015) (CVE-2015-4826)

- mysql: unspecified vulnerability related to Server:Security:Privileges (CPU October 2015) (CVE-2015-4830)

- mysql: unspecified vulnerability related to Server:SP (CPU October 2015) (CVE-2015-4836)

- mysql: unspecified vulnerability related to Server:DML (CPU October 2015) (CVE-2015-4858, CVE-2015-4879, CVE-2015-4913)

- mysql: unspecified vulnerability related to Server:Parser (CPU October 2015) (CVE-2015-4870)

- pcre: buffer overflow for forward reference within backward assertion with excess closing parenthesis (8.38/18) (CVE-2015-5073, CVE-2015-8388)

- pcre: Buffer overflow caused by duplicate named references (8.38/36) (CVE-2015-8381, CVE-2015-8395)

- pcre: Buffer overflow caused by repeated conditional group (8.38/3) (CVE-2015-8383)

- pcre: buffer overflow caused by named forward reference to duplicate group number (8.38/30) (CVE-2015-8385)

- pcre: Buffer overflow caused by lookbehind assertion (8.38/6) (CVE-2015-8386)

- pcre: inefficient posix character class syntax check (8.38/16) (CVE-2015-8391)

- pcre: buffer overflow caused by patterns with duplicated named groups with (?| (8.38/27) (CVE-2015-8392)

- mysql: unspecified vulnerability in subcomponent: Server: Options (CPU January 2016) (CVE-2016-0505)

- mysql: unspecified vulnerability in subcomponent: Client (CPU January 2016) (CVE-2016-0546)

- mysql: unspecified vulnerability in subcomponent: Server: DML (CPU January 2016) (CVE-2016-0596, CVE-2016-0598)

- mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU January 2016) (CVE-2016-0597, CVE-2016-0616)

- mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU January 2016) (CVE-2016-0600, CVE-2016-0610)

- mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU January 2016) (CVE-2016-0606)

- mysql: unspecified vulnerability in subcomponent: Server: UDF (CPU January 2016) (CVE-2016-0608)

- mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU January 2016) (CVE-2016-0609)

- mysql: unspecified vulnerability in subcomponent: Server: DML (CPU April 2016) (CVE-2016-0640, CVE-2016-0643, CVE-2016-0646)

- mysql: unspecified vulnerability in subcomponent: Server: MyISAM (CPU April 2016) (CVE-2016-0641)

- mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU April 2016) (CVE-2016-0642)

- mysql: unspecified vulnerability in subcomponent: Server: DDL (CPU April 2016) (CVE-2016-0644)

- mysql: unspecified vulnerability in subcomponent: Server: FTS (CPU April 2016) (CVE-2016-0647)

- mysql: unspecified vulnerability in subcomponent: Server: PS (CPU April 2016) (CVE-2016-0648, CVE-2016-0649)

- mysql: unspecified vulnerability in subcomponent: Server: Replication (CPU April 2016) (CVE-2016-0650)

- mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU April 2016) (CVE-2016-0651)

- mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU April 2016) (CVE-2016-0655, CVE-2016-0668)

- mysql: unspecified vulnerability in subcomponent: Server: Security: Privileges (CPU April 2016) (CVE-2016-0666)

- pcre: heap buffer overflow in handling of duplicate named groups (8.39/14) (CVE-2016-1283)

- mysql: ssl-validate-cert incorrect hostname check (CVE-2016-2047)

- pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12) (CVE-2016-3191)

- mysql: unspecified vulnerability in subcomponent: Server: Security: Encryption (CPU July 2016) (CVE-2016-3452)

- mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU July 2016) (CVE-2016-3459)

- mysql: unspecified vulnerability in subcomponent: Server: Option (CPU July 2016) (CVE-2016-3471)

- mysql: unspecified vulnerability in subcomponent: Server: Connection (CPU July 2016) (CVE-2016-5444)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL rh-mariadb100-mariadb package based on the guidance in RHSA-2016:1132.

See Also

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?5213fd57

http://www.nessus.org/u?66027465

http://www.nessus.org/u?d701e67c

https://mariadb.com/kb/en/mariadb/mariadb-10021-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10023-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/

https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/

https://bugzilla.redhat.com/show_bug.cgi?id=1228283

https://bugzilla.redhat.com/show_bug.cgi?id=1237223

https://bugzilla.redhat.com/show_bug.cgi?id=1274752

https://bugzilla.redhat.com/show_bug.cgi?id=1274756

https://bugzilla.redhat.com/show_bug.cgi?id=1274759

https://bugzilla.redhat.com/show_bug.cgi?id=1274761

https://bugzilla.redhat.com/show_bug.cgi?id=1274764

https://bugzilla.redhat.com/show_bug.cgi?id=1274766

https://bugzilla.redhat.com/show_bug.cgi?id=1274767

https://bugzilla.redhat.com/show_bug.cgi?id=1274771

https://bugzilla.redhat.com/show_bug.cgi?id=1274773

https://bugzilla.redhat.com/show_bug.cgi?id=1274776

https://bugzilla.redhat.com/show_bug.cgi?id=1274781

https://bugzilla.redhat.com/show_bug.cgi?id=1274783

https://bugzilla.redhat.com/show_bug.cgi?id=1274786

https://bugzilla.redhat.com/show_bug.cgi?id=1274794

https://bugzilla.redhat.com/show_bug.cgi?id=1287614

https://bugzilla.redhat.com/show_bug.cgi?id=1287623

https://bugzilla.redhat.com/show_bug.cgi?id=1287629

https://bugzilla.redhat.com/show_bug.cgi?id=1287636

https://bugzilla.redhat.com/show_bug.cgi?id=1287671

https://bugzilla.redhat.com/show_bug.cgi?id=1287690

https://bugzilla.redhat.com/show_bug.cgi?id=1287711

https://bugzilla.redhat.com/show_bug.cgi?id=1295385

https://bugzilla.redhat.com/show_bug.cgi?id=1301492

https://bugzilla.redhat.com/show_bug.cgi?id=1301493

https://bugzilla.redhat.com/show_bug.cgi?id=1301496

https://bugzilla.redhat.com/show_bug.cgi?id=1301497

https://bugzilla.redhat.com/show_bug.cgi?id=1301498

https://bugzilla.redhat.com/show_bug.cgi?id=1301501

https://bugzilla.redhat.com/show_bug.cgi?id=1301504

https://bugzilla.redhat.com/show_bug.cgi?id=1301506

https://bugzilla.redhat.com/show_bug.cgi?id=1301507

https://bugzilla.redhat.com/show_bug.cgi?id=1301508

https://bugzilla.redhat.com/show_bug.cgi?id=1301510

https://bugzilla.redhat.com/show_bug.cgi?id=1301874

https://bugzilla.redhat.com/show_bug.cgi?id=1311503

https://bugzilla.redhat.com/show_bug.cgi?id=1329239

https://bugzilla.redhat.com/show_bug.cgi?id=1329241

https://bugzilla.redhat.com/show_bug.cgi?id=1329243

https://bugzilla.redhat.com/show_bug.cgi?id=1329245

https://bugzilla.redhat.com/show_bug.cgi?id=1329247

https://bugzilla.redhat.com/show_bug.cgi?id=1329248

https://bugzilla.redhat.com/show_bug.cgi?id=1329249

https://bugzilla.redhat.com/show_bug.cgi?id=1329251

https://bugzilla.redhat.com/show_bug.cgi?id=1329252

https://bugzilla.redhat.com/show_bug.cgi?id=1329253

https://bugzilla.redhat.com/show_bug.cgi?id=1329254

https://bugzilla.redhat.com/show_bug.cgi?id=1329259

https://bugzilla.redhat.com/show_bug.cgi?id=1329270

https://bugzilla.redhat.com/show_bug.cgi?id=1329273

http://www.nessus.org/u?9354bbf3

https://access.redhat.com/errata/RHSA-2016:1132

Plugin Details

Severity: Critical

ID: 193833

File Name: redhat-RHSA-2016-1132.nasl

Version: 1.0

Type: local

Agent: unix

Published: 4/24/2024

Updated: 4/24/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: CVE-2015-8391

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2016-3191

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-config, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-server, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-bench, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-devel, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-common, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-oqgraph-engine, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-errmsg, p-cpe:/a:redhat:enterprise_linux:rh-mariadb100-mariadb-test

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/26/2016

Vulnerability Publication Date: 1/12/2015

Reference Information

CVE: CVE-2015-3210, CVE-2015-3217, CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4879, CVE-2015-4895, CVE-2015-4913, CVE-2015-5073, CVE-2015-8381, CVE-2015-8383, CVE-2015-8384, CVE-2015-8385, CVE-2015-8386, CVE-2015-8388, CVE-2015-8391, CVE-2015-8392, CVE-2015-8395, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0610, CVE-2016-0616, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0651, CVE-2016-0655, CVE-2016-0666, CVE-2016-0668, CVE-2016-1283, CVE-2016-2047, CVE-2016-3191, CVE-2016-3452, CVE-2016-3459, CVE-2016-3471, CVE-2016-5444

CWE: 120, 121, 122, 295, 407, 674

RHSA: 2016:1132