Oracle MySQL 5.7.x < 5.7.8 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9239

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.8 and is affected by multiple issues :

- A flaw exists in the 'my_print_defaults()' function that is due to the program storing output in plaintext. This may allow a local attacker to gain access to password information.
- A flaw exists in InnoDB that is triggered during the handling of a spatial index in an ALTER TABLE operation. This may allow an authenticated attacker to cause the server to exit.
- An invalid memory pointer access flaw exists that is triggered when accessing the Performance Schema 'events_statements_history' table. This may allow an authenticated attacker to cause the server to exit.
- A flaw exists that may allow an attacker with an expired password to execute arbitrary ALTER USER statements. This may allow the attacker to gain limited elevated privileges.
- An off-by-one error exists in the string-copying functionality. The issue is triggered as user-supplied input is not properly sanitized. This may allow an authenticated attacker to cause a limited buffer overflow, which can result in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists that is triggered when handling view column access after DDL or FLUSH TABLES statements in a stored procedure. This may allow an authenticated attacker to cause the server to exit.
- A flaw exists that is triggered when handling GROUP BY or ORDER BY statements in CHAR(0) NOT NULL columns. This may allow an authenticated attacker to cause the server to exit.

Solution

Upgrade to MySQL 5.7.8 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-8.html#mysqld-5-7-8-security

Plugin Details

Severity: Medium

ID: 9239

Family: Database

Published: 4/15/2016

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 8/3/2015

Vulnerability Publication Date: 8/3/2015