Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Recherche Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

MariaDB Server 10.0.x < 10.0.30 Multiple DoS

Medium

Synopsis

The remote database server is affected by multiple Denial of Service (DoS) attack vectors.

Description

The version of MariaDB installed on the remote host is 10.0.x prior to 10.0.30, and is affected by multiple DoS vulnerabilities :

- A flaw exists in the 'Field_time::store_TIME_with_warning()' function that is triggered when handling a specially crafted 'INSERT' query. This may allow an authenticated attacker to crash the database. (OSVDB 153427) - A flaw exists in the 'JOIN_CACHE::create_remaining_fields()' function in 'sql_join_cache.cc' that is triggered when handling data caching. This may allow an authenticated attacker to crash the database. (OSVDB 153428) - A flaw exists in the 'SJ_TMP_TABLE::create_sj_weedout_tmp_table()' function in 'opt_subselect.cc' that is triggered when handling a specially crafted 'WHERE' query. This may allow an authenticated attacker to crash the database. (OSVDB 153429) - A flaw exists in the 'ha_partition::reset()' function in 'ha_partition.cc' that is triggered when handling a specially crafted 'SELECT' query. This may allow an authenticated attacker to crash the database. (OSVDB 153430) - A flaw exists in the 'find_field_in_tables()' function in 'sql_base.cc' that is triggered during the handling of stored procedures in 'EXISTS' queries. This may allow an authenticated attacker to crash the database. (OSVDB 153981) - A flaw exists in the 'JOIN::drop_unused_derived_keys()' function in 'sql_select.cc' that is triggered during the handling of a specially crafted 'SELECT' statement. This may allow an authenticated attacker to crash the database. (OSVDB 153992)

Solution

Upgrade to version 10.0.30 or later.