MariaDB 10.1.x < 10.1.20 Multiple DoS

medium Nessus Plugin ID 96487

Synopsis

The remote database server is affected by multiple denial of service vulnerabilities.

Description

The version of MariaDB running on the remote host is 10.1.x prior to 10.1.20. It is, therefore, affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the trx_state_eq() function due to improper handling of state errors. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_duplicate_key() function due to improper handling of error messages. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_rec_queue_validate() function in lock/lock0lock.cc due to improper handling of lock requests. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the destroy() function in sql/sql_select.cc due to improper handling of a specially crafted query. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the calculate_cond_selectivity_for_table() function in sql/opt_range.cc due to improper handling of 'thd->no_errors'. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/statistics.cc due o improper handling of stat tables. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the parse_filter_rule() function in sql/rpl_filter.cc that is triggered during the clearing of wildcards. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_reset_lock_and_trx_wait() function in storage/innobase/lock/lock0lock.cc due to improper handling of NULL values in wait_lock. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.

Solution

Upgrade to MariaDB version 10.1.20 or later.

See Also

https://mariadb.com/kb/en/library/mariadb-10120-changelog/

https://mariadb.com/kb/en/library/mariadb-10120-release-notes/

Plugin Details

Severity: Medium

ID: 96487

File Name: mariadb_10_1_20.nasl

Version: 1.7

Type: remote

Family: Databases

Published: 1/13/2017

Updated: 1/2/2019

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Required KB Items: Settings/ParanoidReport

Patch Publication Date: 12/24/2016

Vulnerability Publication Date: 6/18/2015