Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2017.0332
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2017-0332)
Resumen:The remote host is missing an update for the 'mariadb' package(s) announced via the MGASA-2017-0332 advisory.
Descripción:Summary:
The remote host is missing an update for the 'mariadb' package(s) announced via the MGASA-2017-0332 advisory.

Vulnerability Insight:
Easily exploitable vulnerability in MariaDB Server allows low privileged
attacker with logon to the infrastructure where MariaDB Server executes
to compromise MariaDB Server. Successful attacks of this vulnerability
can result in unauthorized update, insert or delete access to some of
MariaDB Server accessible data as well as unauthorized read access to a
subset of MariaDB Server accessible data and unauthorized ability to
cause a partial denial of service (partial DOS) of MariaDB Server
(CVE-2017-3636).

Easily exploitable vulnerability in MariaDB Server allows high
privileged attacker with network access via multiple protocols to
compromise MariaDB Server. Successful attacks of this vulnerability can
result in unauthorized ability to cause a hang or frequently repeatable
crash (complete DOS) of MariaDB Server (CVE-2017-3641).

Difficult to exploit vulnerability in MariaDB Server allows low
privileged attacker with network access via multiple protocols to
compromise MariaDB Server. Successful attacks of this vulnerability can
result in unauthorized update, insert or delete access to some of
MariaDB Server accessible data (CVE-2017-3653).

Affected Software/OS:
'mariadb' package(s) on Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-3636
BugTraq ID: 99736
http://www.securityfocus.com/bid/99736
Debian Security Information: DSA-3922 (Google Search)
http://www.debian.org/security/2017/dsa-3922
Debian Security Information: DSA-3944 (Google Search)
http://www.debian.org/security/2017/dsa-3944
Debian Security Information: DSA-3955 (Google Search)
https://www.debian.org/security/2017/dsa-3955
RedHat Security Advisories: RHSA-2017:2787
https://access.redhat.com/errata/RHSA-2017:2787
RedHat Security Advisories: RHSA-2018:0279
https://access.redhat.com/errata/RHSA-2018:0279
RedHat Security Advisories: RHSA-2018:0574
https://access.redhat.com/errata/RHSA-2018:0574
RedHat Security Advisories: RHSA-2018:2439
https://access.redhat.com/errata/RHSA-2018:2439
RedHat Security Advisories: RHSA-2018:2729
https://access.redhat.com/errata/RHSA-2018:2729
http://www.securitytracker.com/id/1038928
Common Vulnerability Exposure (CVE) ID: CVE-2017-3641
BugTraq ID: 99767
http://www.securityfocus.com/bid/99767
RedHat Security Advisories: RHSA-2017:2886
https://access.redhat.com/errata/RHSA-2017:2886
Common Vulnerability Exposure (CVE) ID: CVE-2017-3653
BugTraq ID: 99810
http://www.securityfocus.com/bid/99810
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.