Oracle MySQL 6.0 < 6.0.10 XPath Expression DoS

medium Nessus Network Monitor Plugin ID 5002

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack

Description

The version of MySQL 6.0 installed on the remote host is earlier than 6.0.10 and thus affected by a denial of service vulnerability. Specifically, a user can cause an assertion failure leading to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath expression employing a scalar expression as a 'FilterExpr'.

Solution

Upgrade to MySQL Community Server version 6.0.10 or later.

See Also

http://bugs.mysql.com/bug.php?id=42495

http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html

Plugin Details

Severity: Medium

ID: 5002

Family: Database

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 36020

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mysql:mysql

Reference Information

CVE: CVE-2009-0819

BID: 33972