MariaDB Server 10.1.x < 10.1.13 Multiple DoS

medium Nessus Network Monitor Plugin ID 9294

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.1.x earlier than 10.1.13, and is therefore affected multiple vulnerabilities :

- A flaw exists in the 'Item::basic_const_item()' function that is triggered when handling nested NULLIF statements. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item::cache_const_expr_analyzer()' function in 'sql/item.cc' that is triggered during the handling of caches. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_sum_field::get_tmp_table_field()' function in 'sql/item_sum.h' that is triggered during the handling of temporary tables. This may allow an authenticated attacker to crash the database.
- A flaw exists that is triggered during the handling of a specially crafted 'QT_ITEM_FUNC_NULLIF_TO_CASE NULLIF' statement. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item::save_in_field()' function that is triggered during the handling of date values. This may allow an authenticated attacker to crash the database.

Solution

Upgrade to version 10.1.13 or later.

See Also

https://mariadb.com/kb/en/mariadb-10113-changelog

https://jira.mariadb.org/browse/MDEV-9604

https://jira.mariadb.org/browse/MDEV-9641

https://jira.mariadb.org/browse/MDEV-9644

https://jira.mariadb.org/browse/MDEV-9656

https://jira.mariadb.org/browse/MDEV-9682

https://jira.mariadb.org/browse/MDEV-9683

Plugin Details

Severity: Medium

ID: 9294

Family: Database

Published: 5/13/2016

Updated: 3/6/2019

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 3/25/2016

Vulnerability Publication Date: 2/21/2016