The version of MariaDB installed on the remote host is prior to 10.7.4. It is, therefore, affected by multiple vulnerabilities as referenced in the mariadb-1074-release-notes advisory.
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements. (CVE-2022-27376)
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements. (CVE-2022-27377)
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27378)
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
(CVE-2022-27379)
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27380)
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27381)
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order. (CVE-2022-27382)
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. (CVE-2022-27383)
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
(CVE-2022-27384)
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc. (CVE-2022-27386)
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. (CVE-2022-27387)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc. (CVE-2022-27444)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc. (CVE-2022-27445)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h. (CVE-2022-27446)
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27447)
There is an Assertion failure in MariaDB Server v10.9 and below via ‘node->pcur->rel_pos == BTR_PCUR_ON’ at /row/row0mysql.cc. (CVE-2022-27448)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148. (CVE-2022-27449)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc. (CVE-2022-27451)
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc. (CVE-2022-27452)
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c. (CVE-2022-27455)
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc. (CVE-2022-27456)
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c. (CVE-2022-27457)
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27458)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(160725);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/08/23");
script_cve_id(
"CVE-2021-46669",
"CVE-2022-27376",
"CVE-2022-27377",
"CVE-2022-27378",
"CVE-2022-27379",
"CVE-2022-27380",
"CVE-2022-27381",
"CVE-2022-27382",
"CVE-2022-27383",
"CVE-2022-27384",
"CVE-2022-27386",
"CVE-2022-27387",
"CVE-2022-27444",
"CVE-2022-27445",
"CVE-2022-27446",
"CVE-2022-27447",
"CVE-2022-27448",
"CVE-2022-27449",
"CVE-2022-27451",
"CVE-2022-27452",
"CVE-2022-27455",
"CVE-2022-27456",
"CVE-2022-27457",
"CVE-2022-27458",
"CVE-2022-32083",
"CVE-2022-32085",
"CVE-2022-32086",
"CVE-2022-32087",
"CVE-2022-32088"
);
script_name(english:"MariaDB 10.7.0 < 10.7.4 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of MariaDB installed on the remote host is prior to 10.7.4. It is, therefore, affected by multiple
vulnerabilities as referenced in the mariadb-1074-release-notes advisory.
- MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component
Item_args::walk_arg, which is exploited via specially crafted SQL statements. (CVE-2022-27376)
- MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component
Item_func_in::cleanup(), which is exploited via specially crafted SQL statements. (CVE-2022-27377)
- An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to
allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27378)
- An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was
discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
(CVE-2022-27379)
- An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to
allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27380)
- An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow
attackers to cause a Denial of Service (DoS) via specially crafted SQL statements. (CVE-2022-27381)
- MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component
Item_field::used_tables/update_depend_map_for_order. (CVE-2022-27382)
- MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component
my_strcasecmp_8bit, which is exploited via specially crafted SQL statements. (CVE-2022-27383)
- An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was
discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
(CVE-2022-27384)
- MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component
sql/sql_class.cc. (CVE-2022-27386)
- MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component
decimal_bin_size, which is exploited via specially crafted SQL statements. (CVE-2022-27387)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/item_subselect.cc. (CVE-2022-27444)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/sql_window.cc. (CVE-2022-27445)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/item_cmpfunc.h. (CVE-2022-27446)
- MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component
Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27447)
- There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON'
at /row/row0mysql.cc. (CVE-2022-27448)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/item_func.cc:148. (CVE-2022-27449)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/field_conv.cc. (CVE-2022-27451)
- MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component
sql/item_cmpfunc.cc. (CVE-2022-27452)
- MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component
my_wildcmp_8bit_impl at /strings/ctype-simple.c. (CVE-2022-27455)
- MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec
at /sql/sql_type.cc. (CVE-2022-27456)
- MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component
my_mb_wc_latin1 at /strings/ctype-latin1.c. (CVE-2022-27457)
- MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component
Binary_string::free_buffer() at /sql/sql_string.h. (CVE-2022-27458)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://mariadb.com/kb/en/mariadb-10-7-4-release-notes");
script_set_attribute(attribute:"solution", value:
"Upgrade to MariaDB version 10.7.4 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-32088");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/12");
script_set_attribute(attribute:"patch_publication_date", value:"2022/05/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/05/09");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:mariadb:mariadb");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mariadb_nix_installed.nbin", "mariadb_win_installed.nbin", "mysql_version.nasl", "mysql_login.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/mysql", 3306);
exit(0);
}
include('vcf.inc');
var app_info = vcf::combined_get_app_info(app:'MariaDB');
if (!(app_info.local) && report_paranoia < 2)
audit(AUDIT_POTENTIAL_VULN, 'MariaDB');
vcf::check_all_backporting(app_info:app_info);
var constraints = [
{ 'min_version' : '10.7', 'fixed_version' : '10.7.4' }
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088
mariadb.com/kb/en/mariadb-10-7-4-release-notes