Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
MariaDB 'COM_CHANGE_USER' Command Insecure Salt Generation Security Bypass Vulnerability (Linux)
Information
Severity
Severity
Medium
Family
Family
Databases
CVSSv2 Base
CVSSv2 Base
4.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
Solution Type
Solution Type
Vendor Patch
Created
Created
7 years ago
Modified
Modified
4 years ago
Summary
This host is running MariaDB and is prone to security bypass vulnerability.
Insight
Insight
Flaw that is triggered when a remote attacker attempts to login to a user's account via the COM_CHANGE_USER command. This command fails to properly disconnect the attacker from the server upon a failed login attempt.
Affected Software
Affected Software
MariaDB versions 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 on Linux
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to MariaDB version 5.2.14, 5.3.12, 5.5.29 or later.