RHEL 6 : mariadb55-mariadb (RHSA-2014:0189)

medium Nessus Plugin ID 210193

Synopsis

The remote Red Hat host is missing one or more security updates for mariadb55-mariadb.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2014:0189 advisory.

MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL.

This update fixes several vulnerabilities in the MariaDB database server.
Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section. (CVE-2013-5807, CVE-2013-5891, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437, CVE-2013-3839, CVE-2013-5908)

A buffer overflow flaw was found in the way the MariaDB command line client tool (mysql) processed excessively long version strings. If a user connected to a malicious MariaDB server via the mysql client, the server could use this flaw to crash the mysql client or, potentially, execute arbitrary code as the user running the mysql client. (CVE-2014-0001)

The CVE-2014-0001 issue was discovered by Garth Mollett of the Red Hat Security Response Team.

These updated packages upgrade MariaDB to version 5.5.35. Refer to the MariaDB Release Notes listed in the References section for a complete list of changes.

All MariaDB users should upgrade to these updated packages, which correct these issues. After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL mariadb55-mariadb package based on the guidance in RHSA-2014:0189.

See Also

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?e038a357

http://www.nessus.org/u?532e14d2

https://mariadb.com/kb/en/mariadb-5535-release-notes/

https://bugzilla.redhat.com/show_bug.cgi?id=1019978

https://bugzilla.redhat.com/show_bug.cgi?id=1019997

https://bugzilla.redhat.com/show_bug.cgi?id=1053371

https://bugzilla.redhat.com/show_bug.cgi?id=1053373

https://bugzilla.redhat.com/show_bug.cgi?id=1053375

https://bugzilla.redhat.com/show_bug.cgi?id=1053377

https://bugzilla.redhat.com/show_bug.cgi?id=1053378

https://bugzilla.redhat.com/show_bug.cgi?id=1053380

https://bugzilla.redhat.com/show_bug.cgi?id=1053381

https://bugzilla.redhat.com/show_bug.cgi?id=1053383

https://bugzilla.redhat.com/show_bug.cgi?id=1053390

https://bugzilla.redhat.com/show_bug.cgi?id=1054592

http://www.nessus.org/u?5d25c283

https://access.redhat.com/errata/RHSA-2014:0189

Plugin Details

Severity: Medium

ID: 210193

File Name: redhat-RHSA-2014-0189.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/4/2024

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2014-0001

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2014-0437

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb-devel, p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb-bench, p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb-test, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb, p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb-server, p-cpe:/a:redhat:enterprise_linux:mariadb55-mariadb-libs

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/19/2014

Vulnerability Publication Date: 10/15/2013

Reference Information

CVE: CVE-2013-3839, CVE-2013-5807, CVE-2013-5891, CVE-2013-5908, CVE-2014-0001, CVE-2014-0386, CVE-2014-0393, CVE-2014-0401, CVE-2014-0402, CVE-2014-0412, CVE-2014-0420, CVE-2014-0437

RHSA: 2014:0189