MariaDB 10.2.x < 10.2.3 Multiple DoS

medium Nessus Plugin ID 96488

Synopsis

The remote database server is affected by multiple denial of service vulnerabilities.

Description

The version of MariaDB running on the remote host is 10.2.x prior to 10.2.3. It is, therefore, affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the trx_state_eq() function due to improper handling of state errors. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_rec_queue_validate() function in lock/lock0lock.cc due to improper handling of lock requests. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the date_add_interval() function in sql/sql_time.cc due to improper handling of INTERVAL arguments. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_contains() function in sql/item_jsonfunc.cc due to improper handling of a specially crafted array. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the init_ror_merged_scan() function in sql/opt_range.cc due to improper handling a specially crafted table column.
An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the val_str() function in sql/item_jsonfunc.cc due to improper handling of scalar values. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON_VALID selections. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON arrays. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the mark_object() and mark_array() functions in strings/json_lib.c due to improper handling of JSON_VALID selections. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the fix_length_and_dec() function in sql/item_jsonfunc.cc due to improper handling of JSON casting. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the fparse_one_or_all() function in sql/item_jsonfunc.cc due to improper handling of input passed via the 'one_or_all' parameter. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the val_str() function in sql/item_jsonfunc.cc due to improper handling of value_length. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the val_int() function in sql/item_jsonfunc.cc due to improper handling of NULL paths. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the merge_buffers() function in sql/filesort.cc due to improper handling of sort_union optimization. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the mysql_rm_table_no_locks() function in sql/sql_table.cc that is triggered when dropping temporary tables. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_view_single_update() function in sql/sql_insert.cc that is triggered when inserting specially crafted tables. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the lock_reset_lock_and_trx_wait() function in storage/innobase/lock/lock0lock.cc due to improper handling of NULL values in wait_lock. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.

Solution

Upgrade to MariaDB version 10.2.3 or later.

See Also

https://mariadb.com/kb/en/library/mariadb-1023-changelog/

https://mariadb.com/kb/en/library/mariadb-1023-release-notes/

Plugin Details

Severity: Medium

ID: 96488

File Name: mariadb_10_2_3.nasl

Version: 1.7

Type: remote

Family: Databases

Published: 1/13/2017

Updated: 1/2/2019

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Required KB Items: Settings/ParanoidReport

Patch Publication Date: 12/24/2016

Vulnerability Publication Date: 7/17/2016