Synopsis
The remote database server is affected by multiple attack vectors.
Description
MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.0.x earlier than 10.0.22 or 10.1.x earlier than 10.1.9, and is therefore affected by the following vulnerabilities :
- A denial of service vulnerability exists due to a flaw in the 'ha_partition::index_init()' function that is triggered when handling the priority queue. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
- A denial of service vulnerability exists due to a flaw in the 'Item_field::fix_outer_field()' function that is triggered when handling PREPARE statements. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
- A denial of service vulnerability exists due to a flaw in the 'handle_grant_struct()' function that is triggered when handling HASH updates. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
- A denial of service vulnerability exists due to a flaw in the 'is_invalid_role_name()' function that is triggered when handling ACLs with blank role names. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
- A denial of service vulnerability exists due to a flaw in the 'Item_direct_view_ref' class that is triggered when handling SELECT queries. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
- A denial of service vulnerability exists due to a flaw in the 'opt_sum_query()' function that is triggered when handling constant tables. An authenticated, remote attacker can exploit this, via a specially crafted query, to cause the database to crash.
Solution
Upgrade to version 10.1.9 or later. If version 10.1.x cannot be obtained, 10.0.22 is also patched for these issues.
Plugin Details
Nessus ID: 84796
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:mariadb:mariadb
Patch Publication Date: 10/30/2015
Vulnerability Publication Date: 8/13/2015