CVE编号
CVE-2020-28912利用情况
暂无补丁情况
官方补丁披露时间
2020-12-25漏洞描述
With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://hackerone.com/reports/1019891 | |
https://jira.mariadb.org/browse/MDEV-24040 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | mariadb | mariadb | * |
Up to (excluding) 10.1.48 |
|||||
运行在以下环境 | |||||||||
应用 | mariadb | mariadb | * |
From (including) 10.2.0 |
Up to (excluding) 10.2.35 |
||||
运行在以下环境 | |||||||||
应用 | mariadb | mariadb | * |
From (including) 10.3.0 |
Up to (excluding) 10.3.26 |
||||
运行在以下环境 | |||||||||
应用 | mariadb | mariadb | * |
From (including) 10.4.0 |
Up to (excluding) 10.4.16 |
||||
运行在以下环境 | |||||||||
应用 | mariadb | mariadb | * |
From (including) 10.5.0 |
Up to (excluding) 10.5.7 |
||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | mariadb | * |
Up to (excluding) 10.3.27-r0 |
|||||
运行在以下环境 | |||||||||
系统 | microsoft | windows | - | - | |||||
运行在以下环境 | |||||||||
系统 | unionos_20 | mariadb | * |
Up to (excluding) 0 |
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...