CVE-2013-1861
MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
Published
2013-03-28T23:55:01.763
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 5.0 (MEDIUM)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
Affected Vendors & Products
References
-
http://lists.askmonty.org/pipermail/commits/2013-March/004371.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html
Mailing List, Third Party Advisory
([email protected])
-
http://seclists.org/oss-sec/2013/q1/671
Mailing List, Third Party Advisory
([email protected])
-
http://secunia.com/advisories/52639
Not Applicable
([email protected])
-
http://secunia.com/advisories/54300
Not Applicable
([email protected])
-
http://security.gentoo.org/glsa/glsa-201409-04.xml
Third Party Advisory
([email protected])
-
http://www.debian.org/security/2013/dsa-2818
Third Party Advisory
([email protected])
-
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
Third Party Advisory
([email protected])
-
http://www.osvdb.org/91415
Broken Link
([email protected])
-
http://www.securityfocus.com/bid/58511
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.ubuntu.com/usn/USN-1909-1
Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=919247
Issue Tracking, Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/82895
Third Party Advisory, VDB Entry
([email protected])
-
https://mariadb.atlassian.net/browse/MDEV-4252
Broken Link
([email protected])
-
http://lists.askmonty.org/pipermail/commits/2013-March/004371.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://seclists.org/oss-sec/2013/q1/671
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/52639
Not Applicable
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/54300
Not Applicable
(af854a3a-2127-422b-91ae-364da2661108)
-
http://security.gentoo.org/glsa/glsa-201409-04.xml
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2013/dsa-2818
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.osvdb.org/91415
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/58511
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.ubuntu.com/usn/USN-1909-1
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=919247
Issue Tracking, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/82895
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://mariadb.atlassian.net/browse/MDEV-4252
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)