Database Flaws Fixed

Tuesday, November 8, 2016 @ 05:11 PM gHale


Developers updated database management systems MySQL, MariaDB and PerconaDB which suffer from serious privilege escalation vulnerabilities.

Security researcher Dawid Golunski discovered a serious arbitrary code execution vulnerability in MySQL (CVE-2016-6662), which Oracle had failed to patch in more than 40 days after being notified of its existence.

RELATED STORIES
Oracle’s Patch Update
Fixes for MySQL Holes Near
Acrobat, Reader, Flash, Creative Cloud Patched
Microsoft Mitigates 4 Zero Days

Golunski said he had also found another flaw, tracked as CVE-2016-6663, which made exploitation of CVE-2016-6662 easier.

Last week, the researcher disclosed the details of CVE-2016-6663, which Oracle tracks as CVE-2016-5616. The weakness is a race condition that allows a local user with low-privilege access to escalate privileges and execute arbitrary code with the permissions of the database system user (e.g. “mysql”).

Once this vulnerability ends up exploited, the attacker can escalate privileges even further by leveraging CVE-2016-6662 or a new flaw tracked as CVE-2016-6664, or CVE-2016-5617 by Oracle.

Golunski said a malicious actor can chain CVE-2016-6663 with CVE-2016-6662 or CVE-2016-6664 to escalate privileges to root and fully compromise the targeted system. The expert has published proof-of-concept (PoC) exploits showing how the attack works.



Leave a Reply

You must be logged in to post a comment.