Lucene search

K
nessusTenable9911.PRM
HistoryJan 26, 2017 - 12:00 a.m.

MariaDB Server 5.5.x < 5.5.54 Multiple Vulnerabilities

2017-01-2600:00:00
Tenable
www.tenable.com
14

MariaDB is a community-developed fork of the MySQL relational database. The version of MariaDB installed on the remote host is 5.5.x earlier than 5.5.54, and is therefore affected by multiple vulnerabilities :

  • A flaw exists in ‘scripts/mysqld_safe.sh’ that is triggered when handling arguments to ‘malloc-lib’. This may allow a local attacker to potentially gain elevated privileges.
  • A flaw exists in ‘sql/item_subselect.cc’ that is triggered during the handling of queries from the select/unit tree. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘Item::check_well_formed_result()’ function in ‘sql/item.cc’ that is triggered during the handling of row validation. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘Rpl_filter::parse_filter_rule()’ function in ‘sql/rpl_filter.cc’ that is triggered during the clearing of wildcards. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘lex_one_token()’ function in ‘sql/sql_lex.cc’ that is triggered during the handling of a specially crafted query. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘merge_buffers()’ function in ‘sql/filesort.cc’ that is triggered during the handling of ‘sort_union’ optimization. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘Item_cache::safe_charset_converter()’ function in ‘sql/item.cc’ that is triggered during the handling of a specially crafted subselect query item. This may allow an authenticated attacker to crash the database.
  • A flaw exists in the ‘st_select_lex::is_merged_child_of()’ function in ‘sql/sql_lex.cc’ that is triggered when handling merged views or derived tables. This may allow an authenticated attacker to crash the database.
  • A flaw exists in ‘sql/item.cc’ that is triggered during the handling of a specially crafted subquery. This may allow an authenticated attacker to crash the database.
  • A flaw exists in ‘scripts/mysqld_safe.sh’ related to insecure use of certain shell utilities e.g. chown and rm when handling error log files. This may allow a local attacker via a symlink attack to gain ‘root’ privileges.
  • An unspecified flaw exists related to the DDL subcomponent. This may allow an authenticated attacker to cause a denial of service. No further details have been provided by the vendor.
  • An unspecified flaw exists related to the DML subcomponent. This may allow an authenticated attacker to cause a denial of service. No further details have been provided by the vendor.
  • An unspecified flaw exists related to the ‘Server:Optimizer’ subcomponent. This may allow an authenticated attacker to cause a denial of service. No further details have been provided by the vendor.
  • A flaw exists in ‘scripts/mysqld_safe.sh’ related to handling of the ‘–ledir’ command line option used to specify the directory where mysqld is stored, as this value may be read from the configuration file. This may allow a local attacker to gain elevated privileges.
  • A flaw exists in the ‘packaging/rpm-oel/mysql.init’ initialization script related to insecure use of the chown and chmod utilities. This may allow a local attacker to potentially gain ‘root’ privileges.
  • An unspecified flaw exists related to the Logging subcomponent. This may allow a local attacker to cause a denial of service. No further details have been provided by the vendor.
  • An unspecified flaw exists related to the Error Handling subcomponent. This may allow a local attacker to gain access to sensitive information. No further details have been provided by the vendor.
Binary data 9911.prm
VendorProductVersionCPE
mariadbmariadbcpe:/a:mariadb:mariadb