|
|||
Rule General Information |
---|
Release Date: | 2017-11-07 | |
Rule Name: | Oracle MySQL Arbitrary Code Execution Vulnerability - 2 (CVE-2016-6662) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. The vulnerability can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows | |
Reference: | http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html SecurityFocusBID:92912 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html ExploitDB:40360 |
|
Solutions |
---|
Update to the following version to eliminate the vulnerability: Mysql 5.5.52, 5.6.33 and 5.7.15. Percona DB 5.7.14-7,5.6.32-78.0 and 5.5.51-38.1. MariaDB 5.5.51, 10.1.17, 10.0.27. |