Synopsis
The remote database server is affected by multiple attack vectors.
Description
MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 10.0.x earlier than 10.0.25, and is therefore affected by multiple vulnerabilities :
- A flaw exists in the 'my_decimal_precision_to_length_no_truncation()' function in 'item_cmpfunc.cc' that is triggered when handling SELECT CASE statements. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'TDBTBM::ResetDB()' function in 'storage/connect/tabtbl.cpp' that is triggered when sorting a TBL table with thread set to 'yes'. This may allow an authenticated attacker to crash the database.
- A heap corruption flaw exists related to 'main.shm' in the 'handle_connections_shared_memory()' function in 'mysqld.cc' that is triggered as input is not properly sanitized. This may allow an authenticated attacker to crash the database.
- An overflow condition exists in the 'ha_connect::ha_connect()' function in 'storage/connect/ha_connect.cc'. The issue is triggered as user-supplied input is not properly validated when handling partnames. This may allow an authenticated attacker to cause a buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.
- A flaw exists in 'sql_insert.cc' that is triggered during the handling of INSERT or REPLACE DELAYED statements. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'Item_func_match::fix_index()' function in 'sql/item_func.cc' that is triggered during the handling a full-text search of the 'utf8mb4' column. This may allow an authenticated attacker to crash the database.
Solution
Upgrade to version 10.0.25 or later.