CVE-2020-28912

NameCVE-2020-28912
DescriptionWith MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mariadb-10.3 (PTS)buster1:10.3.34-0+deb10u1fixed
buster (security)1:10.3.39-0+deb10u2fixed
mariadb-10.5 (PTS)bullseye1:10.5.23-0+deb11u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mariadb-10.1source(unstable)(not affected)
mariadb-10.3source(unstable)(not affected)
mariadb-10.5source(unstable)(not affected)

Notes

- mariadb-10.5 <not-affected> (Only affects MariaDB on Windows)
- mariadb-10.3 <not-affected> (Only affects MariaDB on Windows)
- mariadb-10.1 <not-affected> (Only affects MariaDB on Windows)
https://jira.mariadb.org/browse/MDEV-24040
https://github.com/MariaDB/server/commit/3829b408d6

Search for package or bug name: Reporting problems