Vulnerability Name: | CVE-2021-46667 (CCN-218911) |
Assigned: | 2021-08-13 |
Published: | 2021-08-13 |
Updated: | 2022-09-03 |
Summary: | MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash. |
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 5.5 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.0 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:U/RC:R)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-190
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2021-46667
Source: XF Type: UNKNOWN mariadb-cve202146667-dos(218911)
Source: CCN Type: MDEV-26350 Assertion failure: select_lex->ref_pointer_array.size() % 5 == 0
Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://jira.mariadb.org/browse/MDEV-26350
Source: FEDORA Type: Mailing List, Patch, Third Party Advisory FEDORA-2022-03350936ee
Source: FEDORA Type: Mailing List, Patch, Third Party Advisory FEDORA-2022-5cfe372ab7
Source: FEDORA Type: Mailing List, Patch, Third Party Advisory FEDORA-2022-263f7cc483
Source: CONFIRM Type: Vendor Advisory https://mariadb.com/kb/en/security/
Source: CCN Type: MariaDB Web site MariaDB
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220221-0002/
Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-46667
|
Vulnerable Configuration: | Configuration 1: cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version < 10.2.41)OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.3.0 and < 10.3.32)OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.4.0 and < 10.4.22)OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.5.0 and < 10.5.13)OR cpe:/a:mariadb:mariadb:*:*:*:*:*:*:*:* (Version >= 10.6.0 and < 10.6.5) Configuration 2: cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:35:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:mariadb:mariadb:10.5.9:*:*:*:*:*:*:* Denotes that component is vulnerable |
Oval Definitions |
|
BACK |