MySQL / MariaDB / PerconaDB 提权/条件竞争漏洞

admin 2023-12-02 18:16:14 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
低危 MySQL / MariaDB / PerconaDB 提权/条件竞争漏洞

CVE编号

CVE-2016-6663

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2016-12-14
漏洞描述
Oracle MySQL、MariaDB和Percona Server都是数据库管理系统。MySQL是美国甲骨文(Oracle)公司的产品。MariaDB是美国Monty Program Ab公司和美国MariaDB基金会共同开发的产品。Percona Server是美国Percona公司开发的产品。Percona XtraDB Cluster是一套可扩展的、开源的用于MySQL集群的解决方案。Oracle MySQL、MariaDB和PerconaDB中存在安全漏洞。受到影响的版本有:Oracle MySQL中在5.5.52之前,5.5.3之前的5.6.x,5.7.15之前的5.7.x以及8.0.1之前的8.x;在MariaDB5.5.22之前,10.0.28之前的10.0.x和10.1.18之前的10.1.x; Percona server在5.5.51-38.2之前,5.6.x在5.6.32-78-1之前,5.7.x在5.7.14-8之前;以及Percona XtraDB集群5.5.41-37.0之前,5.6.32-25.17之前的5.6.x以及5.7.14-26.17之前的5.7.x版本。攻击者可以利用该漏洞获取root权限。
解决建议
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:http://www.mysql.com/
参考链接
http://rhn.redhat.com/errata/RHSA-2016-2130.html
http://rhn.redhat.com/errata/RHSA-2016-2131.html
http://rhn.redhat.com/errata/RHSA-2016-2595.html
http://rhn.redhat.com/errata/RHSA-2016-2749.html
http://rhn.redhat.com/errata/RHSA-2016-2927.html
http://rhn.redhat.com/errata/RHSA-2016-2928.html
http://rhn.redhat.com/errata/RHSA-2017-0184.html
http://seclists.org/fulldisclosure/2016/Nov/4
http://www.openwall.com/lists/oss-security/2016/10/25/4
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.securityfocus.com/bid/92911
http://www.securityfocus.com/bid/93614
https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-...
https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
https://www.exploit-db.com/exploits/40678/
https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 mariadb mariadb * From (including) 10.0.0 Up to (excluding) 10.0.28
运行在以下环境
应用 mariadb mariadb * From (including) 10.1.0 Up to (excluding) 10.1.18
运行在以下环境
应用 mariadb mariadb * From (including) 5.5.20 Up to (excluding) 5.5.52
运行在以下环境
应用 oracle mysql * From (including) 5.5.0 Up to (including) 5.5.52
运行在以下环境
应用 oracle mysql * From (including) 5.6.0 Up to (including) 5.6.33
运行在以下环境
应用 oracle mysql * From (including) 5.7.0 Up to (including) 5.7.15
运行在以下环境
应用 oracle mysql 8.0 -
运行在以下环境
应用 percona percona_server * From (including) 5.5 Up to (excluding) 5.5.51-38.2
运行在以下环境
应用 percona percona_server * From (including) 5.6 Up to (excluding) 5.6.32-78.1
运行在以下环境
应用 percona percona_server * From (including) 5.7 Up to (excluding) 5.7.14-8
运行在以下环境
应用 percona xtradb_cluster * From (including) 5.5 Up to (excluding) 5.5.41-37.0
运行在以下环境
应用 percona xtradb_cluster * From (including) 5.6 Up to (excluding) 5.6.32-25.17
运行在以下环境
应用 percona xtradb_cluster * From (including) 5.7 Up to (excluding) 5.7.14-26.17
运行在以下环境
系统 amazon_AMI mysql51 * Up to (excluding) 5.1.73-8.72.amzn1
运行在以下环境
系统 centos_6 mysql * Up to (excluding) 5.1.73-8.el6_8
运行在以下环境
系统 centos_7 mariadb * Up to (excluding) 5.5.52-1.el7
运行在以下环境
系统 debian DPKG * Up to (excluding) 5.5.52-0+deb8u1
运行在以下环境
系统 debian_7 mysql-5.5 * Up to (excluding) 5.5.52-0+deb7u1
运行在以下环境
系统 debian_8 mariadb-10.0 * Up to (excluding) 10.0.35-0+deb8u1
运行在以下环境
系统 opensuse_Leap_42.1 libmysqlclient18-32bit * Up to (excluding) 10.0.28-15.1
运行在以下环境
系统 opensuse_Leap_42.2 libmysqlclient18-32bit * Up to (excluding) 10.0.28-15.1
运行在以下环境
系统 oracle_6 oraclelinux-release * Up to (excluding) 5.1.73-8.0.1.el6_8
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 5.5.52-1.el7
运行在以下环境
系统 redhat_6 mysql * Up to (excluding) 0:5.1.73-8.el6_8
运行在以下环境
系统 redhat_7 mariadb * Up to (excluding) 5.5.52-1.el7
运行在以下环境
系统 suse_12 libmysqlclient18 * Up to (excluding) 10.0.30-28
运行在以下环境
系统 suse_12_SP1 mariadb-tools * Up to (excluding) 10.0.28-17.2
运行在以下环境
系统 suse_12_SP2 mariadb-tools * Up to (excluding) 10.0.28-17.2
运行在以下环境
系统 ubuntu_12.04.5_lts mysql-5.5 * Up to (excluding) 5.5.52-0ubuntu0.12.04.1
运行在以下环境
系统 ubuntu_14.04 mariadb-5.5 * Up to (excluding) 5.5.52-0ubuntu0.14.04.1
运行在以下环境
系统 ubuntu_14.04.6_lts mariadb-5.5 * Up to (excluding) 5.5.52-1ubuntu0.14.04.1
运行在以下环境
系统 ubuntu_16.04 percona-xtradb-cluster-5.6 * Up to (excluding) 5.6.34-26.19-0ubuntu0.16.04.1
运行在以下环境
系统 ubuntu_16.04.7_lts mariadb-10.0 * Up to (excluding) 10.0.28-0ubuntu0.16.04.1
运行在以下环境
系统 ubuntu_18.04.5_lts mysql-5.7 * Up to (excluding) 5.7.15-0ubuntu2
运行在以下环境
系统 ubuntu_18.10 mysql-5.7 * Up to (excluding) 5.7.15-0ubuntu2
阿里云评分 2.3
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 普通权限
  • 影响范围 有限影响
  • EXP成熟度 POC 已公开
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 100
CWE-ID 漏洞类型
CWE-362 使用共享资源的并发执行不恰当同步问题(竞争条件)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0