CVE-2013-1861

MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
References
Link Resource
http://lists.askmonty.org/pipermail/commits/2013-March/004371.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html Mailing List Third Party Advisory
http://seclists.org/oss-sec/2013/q1/671 Mailing List Third Party Advisory
http://secunia.com/advisories/52639 Not Applicable
http://secunia.com/advisories/54300 Not Applicable
http://security.gentoo.org/glsa/glsa-201409-04.xml Third Party Advisory
http://www.debian.org/security/2013/dsa-2818 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Third Party Advisory
http://www.osvdb.org/91415 Broken Link
http://www.securityfocus.com/bid/58511 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1909-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=919247 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/82895 Third Party Advisory VDB Entry
https://mariadb.atlassian.net/browse/MDEV-4252 Broken Link
http://lists.askmonty.org/pipermail/commits/2013-March/004371.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html Mailing List Third Party Advisory
http://seclists.org/oss-sec/2013/q1/671 Mailing List Third Party Advisory
http://secunia.com/advisories/52639 Not Applicable
http://secunia.com/advisories/54300 Not Applicable
http://security.gentoo.org/glsa/glsa-201409-04.xml Third Party Advisory
http://www.debian.org/security/2013/dsa-2818 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Third Party Advisory
http://www.osvdb.org/91415 Broken Link
http://www.securityfocus.com/bid/58511 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1909-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=919247 Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/82895 Third Party Advisory VDB Entry
https://mariadb.atlassian.net/browse/MDEV-4252 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://lists.askmonty.org/pipermail/commits/2013-March/004371.html - Mailing List, Third Party Advisory () http://lists.askmonty.org/pipermail/commits/2013-March/004371.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html - Mailing List, Third Party Advisory
References () http://seclists.org/oss-sec/2013/q1/671 - Mailing List, Third Party Advisory () http://seclists.org/oss-sec/2013/q1/671 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/52639 - Not Applicable () http://secunia.com/advisories/52639 - Not Applicable
References () http://secunia.com/advisories/54300 - Not Applicable () http://secunia.com/advisories/54300 - Not Applicable
References () http://security.gentoo.org/glsa/glsa-201409-04.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201409-04.xml - Third Party Advisory
References () http://www.debian.org/security/2013/dsa-2818 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2818 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - Third Party Advisory
References () http://www.osvdb.org/91415 - Broken Link () http://www.osvdb.org/91415 - Broken Link
References () http://www.securityfocus.com/bid/58511 - Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/58511 - Exploit, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1909-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1909-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=919247 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=919247 - Issue Tracking, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/82895 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/82895 - Third Party Advisory, VDB Entry
References () https://mariadb.atlassian.net/browse/MDEV-4252 - Broken Link () https://mariadb.atlassian.net/browse/MDEV-4252 - Broken Link

Information

Published : 2013-03-28 23:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1861

Mitre link : CVE-2013-1861

CVE.ORG link : CVE-2013-1861


JSON object : View

Products Affected

mariadb

  • mariadb

opensuse

  • opensuse

redhat

  • enterprise_linux

suse

  • linux_enterprise_software_development_kit
  • linux_enterprise_server
  • linux_enterprise_desktop

canonical

  • ubuntu_linux

oracle

  • mysql

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer