CVE-2023-5157

Source
https://cve.org/CVERecord?id=CVE-2023-5157
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5157.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-5157
Aliases
Downstream
Related
Published
2023-09-27T15:19:41.807Z
Modified
2026-04-12T08:24:17.500557Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "38"
                }
            ],
            "cpe": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.8"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0_aarch64"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0_aarch64"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.8_aarch64"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.6_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.8_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2_s390x"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0_ppc64le"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.0_ppc64le"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.8_ppc64le"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2_ppc64le"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.4"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.4"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.6"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
        },
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.8"
                }
            ],
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*"
        }
    ]
}
References

Affected packages

Git / github.com/mariadb/server

Affected ranges

Type
GIT
Repo
https://github.com/mariadb/server
Events
Database specific
{
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "10.3.36"
        },
        {
            "introduced": "10.7.0"
        },
        {
            "fixed": "10.7.5"
        },
        {
            "introduced": "10.8.0"
        },
        {
            "fixed": "10.8.4"
        },
        {
            "introduced": "10.4.0"
        },
        {
            "fixed": "10.4.26"
        },
        {
            "introduced": "10.5.0"
        },
        {
            "fixed": "10.5.17"
        },
        {
            "introduced": "10.6.0"
        },
        {
            "fixed": "10.6.9"
        }
    ],
    "cpe": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
}

Affected versions

mariadb-10.*
mariadb-10.1.0
mariadb-10.1.2
mariadb-10.1.3
mariadb-10.1.4
mariadb-10.1.5
mariadb-10.1.6
mariadb-10.1.7
mariadb-10.1.8
mariadb-10.2.0
mariadb-10.2.1
mariadb-10.2.2
mariadb-10.3.0
mariadb-10.3.1
mariadb-10.3.10
mariadb-10.3.12
mariadb-10.3.16
mariadb-10.3.17
mariadb-10.3.18
mariadb-10.3.19
mariadb-10.3.2
mariadb-10.3.20
mariadb-10.3.21
mariadb-10.3.26
mariadb-10.3.30
mariadb-10.3.31
mariadb-10.3.33
mariadb-10.3.35
mariadb-10.3.4
mariadb-10.3.5
mariadb-10.3.6
mariadb-10.3.7
mariadb-10.4.10
mariadb-10.4.11
mariadb-10.4.20
mariadb-10.4.21
mariadb-10.4.22
mariadb-10.4.23
mariadb-10.4.25
mariadb-10.4.3
mariadb-10.4.4
mariadb-10.4.5
mariadb-10.4.7
mariadb-10.4.9
mariadb-10.5.0
mariadb-10.5.11
mariadb-10.5.12
mariadb-10.5.13
mariadb-10.5.14
mariadb-10.5.16
mariadb-10.5.2
mariadb-10.5.4
mariadb-10.6.0
mariadb-10.6.1
mariadb-10.6.2
mariadb-10.6.3
mariadb-10.6.4
mariadb-10.6.5
mariadb-10.6.6
mariadb-10.6.8
mariadb-10.7.1
mariadb-10.7.2
mariadb-10.7.4
mariadb-10.8.1
mariadb-10.8.3

Database specific

vanir_signatures_modified
"2026-04-12T08:24:17Z"
vanir_signatures
[
    {
        "signature_type": "Function",
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2023-5157-bab28f5d",
        "source": "https://github.com/mariadb/server/commit/faddcf3c395da640b760c3f701f5bc1f3baae6c4",
        "digest": {
            "length": 1094.0,
            "function_hash": "96567548985656349046472553596954460768"
        },
        "target": {
            "file": "sql/strfunc.cc",
            "function": "find_set"
        }
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2023-5157-ee10862f",
        "source": "https://github.com/mariadb/server/commit/faddcf3c395da640b760c3f701f5bc1f3baae6c4",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "271363707396860767418283350345897486504",
                "120596951573328682502907908502941671745",
                "115421961338400510566446524145876737974",
                "64074615696916198601226435566349591945"
            ]
        },
        "target": {
            "file": "sql/strfunc.cc"
        }
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5157.json"