MariaDB 10.1.x < 10.1.14 Multiple Vulnerabilities

low Nessus Plugin ID 91766

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MariaDB running on the remote host is 10.1.x prior to 10.1.14. It is, therefore, affected by multiple vulnerabilities :

- An unspecified flaw exists in the DML subcomponent that allows an authenticated, remote attacker to disclose sensitive information. (CVE-2016-0643)

- An unspecified flaw exists in the FTS subcomponent that allows an authenticated, remote attacker to cause a denial of service condition. (CVE-2016-0647)

- An unspecified flaw exists in the PS subcomponent that allows an authenticated, remote attacker to cause a denial of service condition. (CVE-2016-0648)

- An unspecified flaw exists in the InnoDB subcomponent that allows an authenticated, remote attacker to cause a denial of service condition. (CVE-2016-0655)

- An unspecified flaw exists in the Security: Privileges subcomponent that allows an authenticated, remote attacker to cause a denial of service condition.
(CVE-2016-0666)

- An unspecified flaw exists in the Encryption subcomponent that allows an unauthenticated, remote attacker to disclose sensitive information.
(CVE-2016-3452)

- An unspecified flaw in the InnoDB subcomponent allows an authenticated, remote attacker to cause a denial of service condition. (CVE-2016-3459)

- An unspecified flaw in the Connection subcomponent allows an unauthenticated, remote attacker to disclose sensitive information. (CVE-2016-5444)

- A heap corruption issue exists in the handle_connections_shared_memory() function in mysqld.cc due to improper sanitization of user-supplied input. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- An overflow condition exists in the ha_connect::ha_connect() function in ha_connect.cc due to improper validation of user-supplied input when when handling partnames. An authenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code.

- An unspecified flaw exists in sql_insert.cc that is triggered during the handling of INSERT or REPLACE DELAYED statements. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the embedded server in the cli_read_prepare_result() function in libmysql.c that is triggered when handling a CREATE TABLE statement. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the acl_load() function in sql_acl.cc that is triggered when handling user tables. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the cost_group_min_max() function in opt_range.cc that is triggered when handling a group by clause. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the Item_subselect::is_expensive() function in item_subselect.cc that is triggered when handling a UNION query. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the validate_password() function in sql_acl.cc that is triggered when handling NULL passwords. An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

- A flaw exists in the Item_func_match::fix_index() function within file sql/item_func.cc due to improper handling of a full-text search of the utf8mb4 column.
An authenticated, remote attacker can exploit this to crash the database, resulting in a denial of service condition.

Solution

Upgrade to MariaDB version 10.1.14 or later.

See Also

https://jira.mariadb.org/browse/MDEV-9986

https://mariadb.org/mariadb-10-1-14-connectorj-1-4-4-now-available/

https://mariadb.com/kb/en/library/mariadb-10114-changelog/

https://mariadb.com/kb/en/library/mariadb-10114-release-notes/

Plugin Details

Severity: Low

ID: 91766

File Name: mariadb_10_1_14.nasl

Version: 1.13

Type: remote

Family: Databases

Published: 6/22/2016

Updated: 11/14/2019

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-5444

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/10/2015

Vulnerability Publication Date: 10/2/2015

Reference Information

CVE: CVE-2016-0643, CVE-2016-0647, CVE-2016-0648, CVE-2016-0655, CVE-2016-0666, CVE-2016-3452, CVE-2016-3459, CVE-2016-5444

BID: 86424, 86457, 86486, 86495, 86509, 91943, 91987, 91999