MariaDB Server 10.0.x < 10.0.28 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9752

Synopsis

The remote database server is affected by multiple attack vectors.

Description

The version of MariaDB installed on the remote host is 10.0.x prior to 10.0.28, and is affected by multiple vulnerabilities :

- An unspecified flaw may allow an authenticated attacker to bypass restrictions and create the '/var/lib/mysql/my.cnf' file with custom contents without the FILE privilege requirement.
- A flaw in the C software version of AES Encryption and Decryption is triggered as table lookups do not properly consider cache-bank access times. This may allow a local user to disclose AES keys via a specially crafted application.
- An unspecified flaw exists related to the MyISAM subcomponent. This may allow a local attacker to gain elevated privileges. No further details have been provided by the vendor.
- An unspecified flaw exists related to the DML subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.
- An unspecified flaw exists related to the GIS subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.
- An unspecified flaw exists related to the Optimizer subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.
- An unspecified flaw exists related to the Federated subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.
- An unspecified flaw exists related to the Security: Encryption subcomponent. This may allow an authenticated remote attacker to disclose potentially sensitive information. No further details have been provided by the vendor.
- An unspecified flaw exists related to the Types subcomponent. This may allow an authenticated remote attacker to cause a denial of service. No further details have been provided by the vendor.
- A flaw exists in the 'fill_alter_inplace_info()' function in 'sql/sql_table.cc' that is triggered when altering persistent virtual columns. This may allow an authenticated attacker to crash the database.
- A flaw exists in the 'mysql_rm_table_no_locks()' function in 'sql/sql_table.cc' that is triggered during the handling of 'CREATE OR REPLACE TABLE' queries. This may allow an authenticated attacker to crash the database.
- A flaw exists in 'scripts/mysqld_safe.sh' that is triggered when handling arguments to 'malloc-lib'. This may allow a local attacker to potentially gain elevated privileges. Note that CVE-2016-6664 is reportedly a duplicate assignment of CVE-2016-5617, which was assigned to this issue's manifestation in Oracle MySQL.

Solution

Upgrade to version 10.0.28 or later.

See Also

https://jira.mariadb.org/browse/MDEV-10835

Plugin Details

Severity: High

ID: 9752

Family: Database

Published: 11/4/2016

Updated: 3/6/2019

Nessus ID: 93380

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Patch Publication Date: 10/19/2016

Vulnerability Publication Date: 9/19/2016

Reference Information

CVE: CVE-2016-3492, CVE-2016-5584, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6663, CVE-2016-6664, CVE-2016-7440, CVE-2016-8283

BID: 93612, 92911, 93614, 93638, 93650, 93735, 93737