MariaDB Server 10.0.x < 10.0.25 / 10.1.x < 10.1.13 Multiple DoS

high Nessus Network Monitor Plugin ID 9279

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.0.x earlier than 10.0.25, or 10.1.x earlier than 10.1.13, and is therefore affected by multiple vulnerabilities :

- An overflow condition exists in the 'extension_based_table_discovery()' function in 'sql/discover.cc'. The issue is triggered as user-supplied input is not properly validated. This may allow an authenticated attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists in the 'row_search_for_mysql()' function in 'storage/xtradb/row/row0sel.cc' that is triggered during the handling of key values. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'mariadb_dyncol_unpack()' function in 'mysys/ma_dyncol.c'. The issue is triggered as user-supplied input is not properly validated. This may allow an authenticated attacker to corrupt memory and cause a denial of service or potentially execute arbitrary code.

Solution

Upgrade to version 10.1.13 or later. If version 10.1.x cannot be obtained, version 10.0.25 has also been patched for these issues.

See Also

https://mariadb.org/mariadb-10-1-13-connectorj-1-3-7-now-available

https://mariadb.com/kb/en/mariadb-10113-changelog

https://mariadb.com/kb/en/mariadb-10025-release-notes

https://mariadb.com/kb/en/mariadb-10025-changelog

https://jira.mariadb.org/browse/MDEV-9667

https://jira.mariadb.org/browse/MDEV-9698

https://jira.mariadb.org/browse/MDEV-9773

Plugin Details

Severity: High

ID: 9279

Family: Database

Published: 5/13/2016

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 3/25/2015

Vulnerability Publication Date: 3/7/2015