SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Database)  >   MySQL Vendors:   MySQL.com, Oracle
(Red Hat Issues Fix) MySQL Multiple Bugs Let Remote Users Access Data, Remote Authenticated Users Modify Data, Local or Remote Authenticated Users Deny Service, and Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1036597
SecurityTracker URL:  http://securitytracker.com/id/1036597
CVE Reference:   CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440   (Links to External Site)
Date:  Aug 12 2016
Impact:   Denial of service via local system, Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.5.49 and prior, 5.6.30 and prior, 5.7.12 and prior
Description:   Multiple vulnerabilities were reported in MySQL. A remote user can access data on the target system. A remote authenticated user can modify data on the target system. A local or remote authenticated user can cause denial of service conditions on the target system. A local user can obtain elevated privileges on the target system.

A local user can exploit a flaw in the Server: Parser component to gain elevated privileges [CVE-2016-3477].

A remote authenticated user can exploit a flaw in the Server: Optimizer component to cause denial of service conditions [CVE-2016-3440].

A local user can exploit a flaw in the Server: Option component to gain elevated privileges [CVE-2016-3471].

A remote authenticated user can exploit a flaw in the Server: FTS component to cause denial of service conditions [CVE-2016-3486].

A remote authenticated user can exploit a flaw in the Server: Optimizer component to cause denial of service conditions [CVE-2016-3501, CVE-2016-3518].

A remote authenticated user can exploit a flaw in the Server: Types component to cause denial of service conditions [CVE-2016-3521].

A remote authenticated user can exploit a flaw in the Server: InnoDB component to partially modify data and cause denial of service conditions [CVE-2016-3588].

A remote authenticated user can exploit a flaw in the Server: DML component to cause denial of service conditions [CVE-2016-3615].

A remote authenticated user can exploit a flaw in the Server: Security: Encryption component to cause denial of service conditions [CVE-2016-3614].

A remote authenticated user can exploit a flaw in the Server: InnoDB component to cause denial of service conditions [CVE-2016-3459, CVE-2016-5436].

A remote authenticated user can exploit a flaw in the Server: Log component to cause denial of service conditions [CVE-2016-5437].

A remote authenticated user can exploit a flaw in the Server: Optimizer component to cause denial of service conditions [CVE-2016-3424].

A remote authenticated user can exploit a flaw in the Server: Privileges component to cause denial of service conditions [CVE-2016-5439].

A remote authenticated user can exploit a flaw in the Server: RBR component to cause denial of service conditions [CVE-2016-5440].

A remote authenticated user can exploit a flaw in the Server: Replication component to cause denial of service conditions [CVE-2016-5441].

A remote authenticated user can exploit a flaw in the Server: Security: Encryption component to cause denial of service conditions [CVE-2016-5442].

A local user can exploit a flaw in the Server: Connection component to cause denial of service conditions [CVE-2016-5443].

A remote user can exploit a flaw in the Server: Connection component to partially access data [CVE-2016-5444].

A remote user can exploit a flaw in the Server: Security: Encryption component to partially access data [CVE-2016-3452].

The following researchers reported these and other Oracle product vulnerabilities:

Accenture TVM Prague; Adam Willard of Raytheon Foreground Security; Alexander Kornbrust of Red Database Security; Alexander Mirosh of Hewlett Packard Enterprise; Alvaro Munoz of Hewlett Packard Enterprise; Alvaro Munoz of Trend Micro's Zero Day Initiative; Ben Lincoln of NCC Group; Brian Martin of Tenable Network Security; Bruno Cirone; Christian Schneider; David Litchfield of Google;
Devin Rosenbauer of Identity Works LLC; Aleksandar Nikolic of Cisco Talos; Jack Fei of FINRA; Juan Manuel Fernandez Torres of Telefonica.com; Kasper Andersen; Matias Mevied of Onapsis; Matthias Kaiser of Code White; Matthias-Christian Ott; Nicholas Lemonias of Advanced Information Security Corporation; Nicolas Collignon of synacktiv; Reno Robert; Spyridon Chatzimichail of OTE Hellenic Telecommunications Organization S.A.; Stephan Borosh of Veris Group, LLC; Stephen Kost of Integrigy;
Steven Seeley (via Beyond Security's SSD program); Sven Blumenstein of Google; Teemu Kaariainen; Ubais PK; and XOR19 of Trend Micro's Zero Day Initiative.

Impact:   A remote user can obtain data on the target system.

A remote authenticated user can modify data on the target system.

A local or remote authenticated user can cause denial of service conditions on the target system.

A local user can obtain elevated privileges on the target system.

Solution:   Red Hat has issued a fix for CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, and CVE-2016-5440.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2016-1603.html

Vendor URL:  rhn.redhat.com/errata/RHSA-2016-1603.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  6, 6.6, 6.7, 7, 7.1, 7.2

Message History:   This archive entry is a follow-up to the message listed below.
Jul 19 2016 MySQL Multiple Bugs Let Remote Users Access Data, Remote Authenticated Users Modify Data, Local or Remote Authenticated Users Deny Service, and Local Users Gain Elevated Privileges



 Source Message Contents

Subject:  [RHSA-2016:1603-01] Important: mariadb55-mariadb security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: mariadb55-mariadb security update
Advisory ID:       RHSA-2016:1603-01
Product:           Red Hat Software Collections
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1603.html
Issue date:        2016-08-11
CVE Names:         CVE-2016-3477 CVE-2016-3521 CVE-2016-3615 
                   CVE-2016-5440 
=====================================================================

1. Summary:

An update for mariadb55-mariadb is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

MariaDB is a multi-user, multi-threaded SQL database server. For all
practical purposes, MariaDB is binary-compatible with MySQL.

The following packages have been upgraded to a newer upstream version:
mariadb55-mariadb (5.5.50).

Security Fix(es):

* This update fixes several vulnerabilities in the MariaDB database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory page, listed in the References section. (CVE-2016-3477,
CVE-2016-3521, CVE-2016-3615, CVE-2016-5440)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the MariaDB server daemon (mysqld) will be
restarted automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1358205 - CVE-2016-3477 mysql: unspecified vulnerability in subcomponent: Server: Parser (CPU July 2016)
1358209 - CVE-2016-3521 mysql: unspecified vulnerability in subcomponent: Server: Types (CPU July 2016)
1358212 - CVE-2016-3615 mysql: unspecified vulnerability in subcomponent: Server: DML (CPU July 2016)
1358218 - CVE-2016-5440 mysql: unspecified vulnerability in subcomponent: Server: RBR (CPU July 2016)

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):

Source:
mariadb55-mariadb-5.5.50-1.el6.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):

Source:
mariadb55-mariadb-5.5.50-1.el6.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):

Source:
mariadb55-mariadb-5.5.50-1.el6.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):

Source:
mariadb55-mariadb-5.5.50-1.el6.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el6.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
mariadb55-mariadb-5.5.50-1.el7.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):

Source:
mariadb55-mariadb-5.5.50-1.el7.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):

Source:
mariadb55-mariadb-5.5.50-1.el7.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
mariadb55-mariadb-5.5.50-1.el7.src.rpm

x86_64:
mariadb55-mariadb-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-bench-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-debuginfo-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-devel-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-libs-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-server-5.5.50-1.el7.x86_64.rpm
mariadb55-mariadb-test-5.5.50-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-3477
https://access.redhat.com/security/cve/CVE-2016-3521
https://access.redhat.com/security/cve/CVE-2016-3615
https://access.redhat.com/security/cve/CVE-2016-5440
https://access.redhat.com/security/updates/classification/#important
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixMSQL
https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXrI6qXlSAg2UNWIIRAuAMAJ9/lUwv+Tsj7708/DZu7BMu9oITsQCeMbhO
BaGf+317EgchrutG1C0R4LY=
=C4GV
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC