#VU32165 Input validation error in MariaDB - CVE-2017-3258


| Updated: 2020-07-28

Vulnerability identifier: #VU32165

Vulnerability risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-3258

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
MariaDB
Server applications / Database software

Vendor: MariaDB Foundation

Description

The vulnerability allows a remote authenticated user to perform a denial of service (DoS) attack.

Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).

Mitigation
Install update from vendor's website.

Vulnerable software versions

MariaDB: 5.5.20 - 5.5.53


External links
https://www.debian.org/security/2017/dsa-3767
https://www.debian.org/security/2017/dsa-3770
https://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
https://www.securityfocus.com/bid/95560
https://www.securitytracker.com/id/1037640
https://access.redhat.com/errata/RHSA-2017:2192
https://access.redhat.com/errata/RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0574
https://security.gentoo.org/glsa/201702-17
https://security.gentoo.org/glsa/201702-18


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability