CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
78.5%
The version of MySQL running on the remote host is 5.7.x prior to 5.7.10. It is, therefore, potentially affected by the following vulnerabilities :
Multiple unspecified flaws exists in the Server : DML subcomponent that allows an authenticated, remote attacker to cause a denial of service. (CVE-2016-0503, CVE-2016-0504)
An unspecified flaw exists in the Server : Options subcomponent that allows an authenticated, remote attacker to cause a denial of service. (CVE-2016-0505)
An unspecified flaw exists in the Client subcomponent that allows a local attacker to gain elevated privileges. (CVE-2016-0546)
Multiple unspecified flaws exist in the Server :
Optimizer subcomponent that allows an authenticated, remote attacker to cause a denial of service.
(CVE-2016-0597, CVE-2016-0598, CVE-2016-0599, CVE-2016-0611)
An unspecified flaw exists in the Server : InnoDB subcomponent that allows an authenticated, remote attacker to cause a denial of service.
(CVE-2016-0600)
An unspecified flaw exists in the Server : Partition subcomponent that allows an authenticated, remote attacker to cause a denial of service.
(CVE-2016-0601)
An unspecified flaw exists in the Server : Security :
Encryption subcomponent that allows an authenticated, remote attacker to impact integrity. (CVE-2016-0606, CVE-2016-0609)
An unspecified flaw exists in the Server : Replication subcomponent that allows an authenticated, remote attacker to cause a denial of service. (CVE-2016-0607)
An unspecified flaw exists in the Server : UDF subcomponent that allows an authenticated, remote attacker to cause a denial of service. (CVE-2016-0608)
A denial of service vulnerability exists due to repeatedly executing a prepared statement when the default database has been changed. An authenticated, remote attacker can exploit this to cause the server to exit.
A denial of service vulnerability exists due to a use-after-free error that is triggered when generated column expressions are reevaluated. An authenticated, remote attacker can exploit this to deference already freed memory, thus causing the server to exit.
A denial of service vulnerability exists due to a flaw that is triggered when selecting DECIMAL values into user-defined variables. An authenticated, remote attacker can exploit this to cause the server to exit.
A denial of service vulnerability exists due to a use-after-free error in spatial functions. An authenticated, remote attacker can exploit this to deference already freed memory, thus causing the server to exit.
A flaw exists in the Server : InnoDB subcomponent due to a failure to check for destination files with the same name when using the ALTER TABLE operation to convert a table to an InnoDB file-per-table tablespace. An authenticated, remote attacker can exploit this to cause a denial of service.
A NULL pointer dereference flaw exists in the Server :
InnoDB subcomponent due to a failure to properly check the return value of an unspecified function call used in a DROP TABLE operation. An authenticated, remote attacker can exploit this to cause a denial of service.
A flaw exists in the Server : InnoDB subcomponent in the row_quiesce_table_start() function that is triggered when running a ‘FLUSH TABLE … FOR EXPORT’ operation on a partitioned table with partitions residing in a system or general tablespace. An authenticated, remote attacker can exploit this to cause a denial of service condition.
A flaw exists in the Server : InnoDB subcomponent that is triggered when handling ‘ALTER TABLE … DISCARD TABLESPACE’ operations. An authenticated, remote attacker can exploit this to cause a denial of service condition.
A flaw exists in the Server : InnoDB subcomponent that is triggered when handling ‘TRUNCATE TABLE’ operations.
An authenticated, remote attacker can exploit this to cause a denial of service condition.
A flaw exists in the Server : InnoDB subcomponent that is triggered when handling ‘SELECT … FOR UPDATE’ operations on tables that only contain virtual columns and virtual column indexes. An authenticated, remote attacker can exploit this to cause a denial of service condition.
A flaw exists in the Server : InnoDB subcomponent that is triggered when handling in-place operations that rebuild tables with multiple indexed virtual columns. An authenticated, remote attacker can exploit this to cause a denial of service condition.
A denial of service vulnerability exists that is triggered when updating views using ALL comparison operators on subqueries that select from indexed columns in the main table. An authenticated, remote attacker can exploit this to cause the server to exit, resulting in a denial of service condition.
A flaw exists in the Server : InnoDB subcomponent that is triggered when handling ALTER TABLE operations. An authenticated, remote attacker can exploit this to cause a denial of service condition.
A remote code execution vulnerability exists due to improper validation of user-supplied input to the strcpy() and sprintf() functions. An authenticated, remote attacker can exploit this to cause a buffer overflow, resulting in a denial of service condition or the execution of arbitrary code.
A denial of service vulnerability exists due to a flaw that is triggered when selecting DECIMAL values into user-defined variables. An authenticated, remote attacker can exploit this to cause the server to exit.
A denial of service vulnerability exists that is triggered when handling concurrent FLUSH PRIVILEGES and REVOKE or GRANT statements. An authenticated, remote attacker can exploit this to cause the server to exit by triggering an invalid memory access to proxy user information.
A denial of service vulnerability exists that is triggered on the second execution of a prepared statement where an ORDER BY clause references a column position. An authenticated, remote attacker can exploit this to cause the server to exit.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(87421);
script_version("1.15");
script_cvs_date("Date: 2019/11/20");
script_cve_id(
"CVE-2016-0503",
"CVE-2016-0504",
"CVE-2016-0505",
"CVE-2016-0546",
"CVE-2016-0597",
"CVE-2016-0598",
"CVE-2016-0599",
"CVE-2016-0600",
"CVE-2016-0601",
"CVE-2016-0606",
"CVE-2016-0607",
"CVE-2016-0608",
"CVE-2016-0609",
"CVE-2016-0611"
);
script_name(english:"MySQL 5.7.x < 5.7.10 Multiple DoS");
script_summary(english:"Checks the version of MySQL server.");
script_set_attribute(attribute:"synopsis", value:
"The remote database server is affected by multiple denial of service
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of MySQL running on the remote host is 5.7.x prior to
5.7.10. It is, therefore, potentially affected by the following
vulnerabilities :
- Multiple unspecified flaws exists in the Server : DML
subcomponent that allows an authenticated, remote
attacker to cause a denial of service. (CVE-2016-0503,
CVE-2016-0504)
- An unspecified flaw exists in the Server : Options
subcomponent that allows an authenticated, remote
attacker to cause a denial of service. (CVE-2016-0505)
- An unspecified flaw exists in the Client subcomponent
that allows a local attacker to gain elevated
privileges. (CVE-2016-0546)
- Multiple unspecified flaws exist in the Server :
Optimizer subcomponent that allows an authenticated,
remote attacker to cause a denial of service.
(CVE-2016-0597, CVE-2016-0598, CVE-2016-0599,
CVE-2016-0611)
- An unspecified flaw exists in the Server : InnoDB
subcomponent that allows an authenticated, remote
attacker to cause a denial of service.
(CVE-2016-0600)
- An unspecified flaw exists in the Server : Partition
subcomponent that allows an authenticated, remote
attacker to cause a denial of service.
(CVE-2016-0601)
- An unspecified flaw exists in the Server : Security :
Encryption subcomponent that allows an authenticated,
remote attacker to impact integrity. (CVE-2016-0606,
CVE-2016-0609)
- An unspecified flaw exists in the Server : Replication
subcomponent that allows an authenticated, remote
attacker to cause a denial of service. (CVE-2016-0607)
- An unspecified flaw exists in the Server : UDF
subcomponent that allows an authenticated, remote
attacker to cause a denial of service. (CVE-2016-0608)
- A denial of service vulnerability exists due to
repeatedly executing a prepared statement when the
default database has been changed. An authenticated,
remote attacker can exploit this to cause the server
to exit.
- A denial of service vulnerability exists due to a
use-after-free error that is triggered when generated
column expressions are reevaluated. An authenticated,
remote attacker can exploit this to deference already
freed memory, thus causing the server to exit.
- A denial of service vulnerability exists due to a flaw
that is triggered when selecting DECIMAL values into
user-defined variables. An authenticated, remote
attacker can exploit this to cause the server to exit.
- A denial of service vulnerability exists due to a
use-after-free error in spatial functions. An
authenticated, remote attacker can exploit this to
deference already freed memory, thus causing the server
to exit.
- A flaw exists in the Server : InnoDB subcomponent due to
a failure to check for destination files with the same
name when using the ALTER TABLE operation to convert a
table to an InnoDB file-per-table tablespace. An
authenticated, remote attacker can exploit this to cause
a denial of service.
- A NULL pointer dereference flaw exists in the Server :
InnoDB subcomponent due to a failure to properly check
the return value of an unspecified function call used in
a DROP TABLE operation. An authenticated, remote
attacker can exploit this to cause a denial of service.
- A flaw exists in the Server : InnoDB subcomponent in the
row_quiesce_table_start() function that is triggered
when running a 'FLUSH TABLE ... FOR EXPORT' operation on
a partitioned table with partitions residing in a system
or general tablespace. An authenticated, remote attacker
can exploit this to cause a denial of service condition.
- A flaw exists in the Server : InnoDB subcomponent that
is triggered when handling 'ALTER TABLE ... DISCARD
TABLESPACE' operations. An authenticated, remote
attacker can exploit this to cause a denial of service
condition.
- A flaw exists in the Server : InnoDB subcomponent that
is triggered when handling 'TRUNCATE TABLE' operations.
An authenticated, remote attacker can exploit this to
cause a denial of service condition.
- A flaw exists in the Server : InnoDB subcomponent that
is triggered when handling 'SELECT ... FOR UPDATE'
operations on tables that only contain virtual columns
and virtual column indexes. An authenticated, remote
attacker can exploit this to cause a denial of service
condition.
- A flaw exists in the Server : InnoDB subcomponent that
is triggered when handling in-place operations that
rebuild tables with multiple indexed virtual columns. An
authenticated, remote attacker can exploit this to cause
a denial of service condition.
- A denial of service vulnerability exists that is
triggered when updating views using ALL comparison
operators on subqueries that select from indexed columns
in the main table. An authenticated, remote attacker can
exploit this to cause the server to exit, resulting in a
denial of service condition.
- A flaw exists in the Server : InnoDB subcomponent that
is triggered when handling ALTER TABLE operations. An
authenticated, remote attacker can exploit this to cause
a denial of service condition.
- A remote code execution vulnerability exists due to
improper validation of user-supplied input to the
strcpy() and sprintf() functions. An authenticated,
remote attacker can exploit this to cause a buffer
overflow, resulting in a denial of service condition or
the execution of arbitrary code.
- A denial of service vulnerability exists due to a flaw
that is triggered when selecting DECIMAL values into
user-defined variables. An authenticated, remote
attacker can exploit this to cause the server to exit.
- A denial of service vulnerability exists that is
triggered when handling concurrent FLUSH PRIVILEGES and
REVOKE or GRANT statements. An authenticated, remote
attacker can exploit this to cause the server to exit by
triggering an invalid memory access to proxy user
information.
- A denial of service vulnerability exists that is
triggered on the second execution of a prepared
statement where an ORDER BY clause references a column
position. An authenticated, remote attacker can exploit
this to cause the server to exit.");
script_set_attribute(attribute:"see_also", value:"https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-10.html");
# http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?75a4a4fb");
# https://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6405bf15");
script_set_attribute(attribute:"solution", value:
"Upgrade to MySQL version 5.7.10 or later.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-0546");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/12/07");
script_set_attribute(attribute:"patch_publication_date", value:"2015/12/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/16");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:mysql");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("mysql_version.nasl", "mysql_login.nasl");
script_require_keys("Settings/ParanoidReport");
script_require_ports("Services/mysql", 3306);
exit(0);
}
include("mysql_version.inc");
mysql_check_version(fixed:'5.7.10', min:'5.7', severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0599
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0601
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0607
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0611
www.nessus.org/u?6405bf15
www.nessus.org/u?75a4a4fb
dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-10.html