Oracle MySQL 5.7.x < 5.7.17 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 9846

Synopsis

The remote database server is vulnerable to multiple attack vectors.

Description

The version of MySQL installed on the remote host is version 5.7.x prior to 5.7.17 and is affected by multiple issues :

- A flaw exists in 'mysqld_safe' that is due to the unsafe use of 'rm' and 'chown'. This may allow an authenticated local attacker to gain elevated privileges.
- An unspecified flaw exists in 'mysqld_safe' that is due to the program ignoring the current working directory. This may allow an authenticated attacker to have an unspecified impact. No further details have been provided.
- An overflow condition exists in the Optimizer. The issue is triggered as certain input is not properly validated when handling nested expressions. This may allow an authenticated attacker to cause a stack-based buffer overflow, resulting in a denial of service.
- A flaw exists that is triggered during the handling of a 'CREATE TABLE' query with a 'DATA DIRECTORY' clause. This may allow an authenticated attacker to gain elevated privileges.

Solution

Upgrade to MySQL 5.7.17 or later.

See Also

http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-17.html

Plugin Details

Severity: High

ID: 9846

Family: Database

Published: 1/3/2017

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:mysql

Patch Publication Date: 12/12/2015

Vulnerability Publication Date: 12/12/2016