MySQL 5.1 < 5.1.32 XPath Expression DoS

medium Nessus Plugin ID 35766

Synopsis

The remote database server is affected by a denial of service vulnerability.

Description

The version of MySQL 5.1 installed on the remote host is earlier than 5.1.32 and is, therefore, affected by a denial of service vulnerability.
Specifically, an authenticated user can cause an assertion failure leading to a server crash by calling 'ExtractValue()' or 'UpdateXML()' using an XPath expression employing a scalar expression as a 'FilterExpr'.

Solution

Upgrade to MySQL Community Server version 5.1.32 or later.

See Also

https://bugs.mysql.com/bug.php?id=42495

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html

Plugin Details

Severity: Medium

ID: 35766

File Name: mysql_5_1_32.nasl

Version: 1.16

Type: remote

Family: Databases

Published: 3/4/2009

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:mysql:mysql

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2009-0819

BID: 33972

Secunia: 34115