MariaDB 5.5.x < 5.5.54 Multiple Vulnerabilities

high Nessus Plugin ID 96489

Synopsis

The remote database server is affected by multiple vulnerabilities.

Description

The version of MariaDB running on the remote host is 5.5.x prior to 5.5.54. It is, therefore, affected by multiple vulnerabilities :

- A privilege escalation vulnerability exists in scripts/mysqld_safe.sh due to improper handling of arguments to malloc-lib. A local attacker can exploit this, via a symlink attack on error logs, to gain root privileges. (CVE-2016-6664)

- A denial of service vulnerability exists in sql/item_subselect.cc due to improper handling of queries from the select/unit tree. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the check_well_formed_result() function in sql/item.cc due to improper handling of row validation. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the parse_filter_rule() function in sql/rpl_filter.cc that is triggered during the clearing of wildcards. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the safe_charset_converter() function in sql/item.cc due to improper handling of a specially crafted subselect query item. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in the st_select_lex::is_merged_child_of() function in sql/sql_lex.cc due to improper handling of merged views or derived tables. An authenticated, remote attacker can exploit this to crash the database.

- A denial of service vulnerability exists in sql/item.cc due to improper handling of a specially crafted subquery. An authenticated, remote attacker can exploit this to crash the database.

Solution

Upgrade to MariaDB version 5.5.54 or later.

See Also

https://mariadb.com/kb/en/mariadb/mariadb-5554-release-notes/

https://mariadb.com/kb/en/library/mariadb-5554-changelog/

Plugin Details

Severity: High

ID: 96489

File Name: mariadb_5_5_54.nasl

Version: 1.10

Type: remote

Family: Databases

Published: 1/13/2017

Updated: 11/18/2022

Configuration: Enable paranoid mode

Supported Sensors: Frictionless Assessment Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-6664

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mariadb:mariadb

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/24/2016

Vulnerability Publication Date: 3/10/2015

Reference Information

CVE: CVE-2016-6664, CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3258, CVE-2017-3265, CVE-2017-3291, CVE-2017-3312, CVE-2017-3317, CVE-2017-3318

BID: 93612