Multiple Vulnerabilities in MySQL, PerconaDB, and MariaDB Could Allow for Arbitrary Code Execution

ITS Advisory Number: 
Date(s) Issued: 
Wednesday, September 14, 2016
Date Updated: 
Wednesday, September 14, 2016
Multiple Vulnerabilities in MySQL, PerconaDB, and MariaDB Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in MySQL, MariaDB, and PerconaDB with the most severe of which could allow for arbitrary code execution. MySQL is a relational database management system that is used to correlate and organize data. MariaDB and PerconaDB are clones of MySQL.

Systems Affected: 
  • MySQL versions 5.5.51 and earlier

  • MySQL versions 5.6.33 and earlier

  • MySQL versions 5.7.11 and earlier

  • MariaDB versions prior to 5.5.51

  • MariaDB versions prior to 10.0.27

  • MariaDB verions prior to 10.1.17

  • PerconaDB versions prior to 5.5.51-38.1

  • PerconaDB versions prior to 5.6.32-78.0

Large and medium government entities: 
Small government entities: 
Large and medium business entities: 
Small business entities: 
Home Users: 

MySQL is prone to a remote code execution vulnerability which may allow an attacker to execute arbitrary code with user rights of the database service. This vulnerability is exploited by an attacker manipulating a "my.cnf" configuration file to include an arbitrary library at the start of MySQL database service. When MySQL is restarted, the arbitrary library can be used by the attacker to execute code with MySQL root user privileges. (CVE-2016-6662)


In addition, MySQL is also prone to a security bypass vulnerability that would allow attackers to create a "/var/lib/mysql/my.cnf" file without the FILE privilege requirement. (CVE-2016-6663)


(Note: Updates will be provided concerning CVE-2016-6663 as more information becomes available. In addition, only MariaDB and PerconaDB currently have patches at this time.)

  • After appropriate testing, apply appropriate updates provided by MariaDB and PerconaDB to vulnerable systems

  • After appropriate testing,apply appropriate updates provided by Oracle for MySQL once they are available.

  • Unless there is a critical and documented business need, do not allow access to the database from external sources by blocking the appropriate port at the perimeter firewall.

  • Configuration files should be checked to ensure that access to the database is restricted to authorized hosts. 

  • Restrict permissions of the user account associated with database service so that it only has read access to the configuration file.