MGASA-2017-0332

Source
https://advisories.mageia.org/MGASA-2017-0332.html
Import Source
https://advisories.mageia.org/MGASA-2017-0332.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0332
Related
Published
2017-09-07T09:07:16Z
Modified
2017-09-07T08:47:35Z
Summary
Updated mariadb packages fix security vulnerabilities
Details

Easily exploitable vulnerability in MariaDB Server allows low privileged attacker with logon to the infrastructure where MariaDB Server executes to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MariaDB Server accessible data as well as unauthorized read access to a subset of MariaDB Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MariaDB Server (CVE-2017-3636).

Easily exploitable vulnerability in MariaDB Server allows high privileged attacker with network access via multiple protocols to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MariaDB Server (CVE-2017-3641).

Difficult to exploit vulnerability in MariaDB Server allows low privileged attacker with network access via multiple protocols to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MariaDB Server accessible data (CVE-2017-3653).

References
Credits

Affected packages

Mageia:6 / mariadb

Package

Name
mariadb
Purl
pkg:rpm/mageia/mariadb?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.1.26-1.mga6

Ecosystem specific

{
    "section": "core"
}