CVE-2023-5157

A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:5683 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:5683 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:5684 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:5684 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6821 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:6821 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6822 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:6822 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6883 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:6883 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:7633 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2023:7633 - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-5157 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-5157 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2240246 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2240246 - Issue Tracking, Third Party Advisory

22 Dec 2023, 19:25

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2023:7633 - () https://access.redhat.com/errata/RHSA-2023:7633 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6821 - () https://access.redhat.com/errata/RHSA-2023:6821 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6822 - () https://access.redhat.com/errata/RHSA-2023:6822 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2023:6883 - () https://access.redhat.com/errata/RHSA-2023:6883 - Third Party Advisory

04 Dec 2023, 12:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2023:7633 -

13 Nov 2023, 12:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2023:6883 -

09 Nov 2023, 02:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2023:6821 -
  • () https://access.redhat.com/errata/RHSA-2023:6822 -

20 Oct 2023, 20:16

Type Values Removed Values Added
CWE CWE-400 NVD-CWE-noinfo
CPE cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.8_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
First Time Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux Server Tus
Redhat enterprise Linux Eus
Redhat enterprise Linux For Power Little Endian Eus
Redhat codeready Linux Builder
Redhat codeready Linux Builder For Ibm Z Systems
Redhat enterprise Linux Server Aus
Redhat enterprise Linux For Ibm Z Systems Eus
Redhat codeready Linux Builder For Arm64 Eus
Redhat codeready Linux Builder For Power Little Endian
Redhat enterprise Linux For Arm 64 Eus
Redhat enterprise Linux For Arm 64
Redhat enterprise Linux For Power Little Endian
Redhat codeready Linux Builder For Ibm Z Systems Eus
Redhat codeready Linux Builder For Arm64
Redhat codeready Linux Builder For Power Little Endian Eus
References (MISC) https://access.redhat.com/errata/RHSA-2023:5684 - (MISC) https://access.redhat.com/errata/RHSA-2023:5684 - Third Party Advisory
References (MISC) https://access.redhat.com/errata/RHSA-2023:5683 - (MISC) https://access.redhat.com/errata/RHSA-2023:5683 - Third Party Advisory

13 Oct 2023, 01:15

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/errata/RHSA-2023:5684 -
  • (MISC) https://access.redhat.com/errata/RHSA-2023:5683 -

02 Oct 2023, 13:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-400
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240246 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2240246 - Issue Tracking, Third Party Advisory
References (MISC) https://access.redhat.com/security/cve/CVE-2023-5157 - (MISC) https://access.redhat.com/security/cve/CVE-2023-5157 - Third Party Advisory
First Time Redhat
Redhat enterprise Linux
Fedoraproject
Mariadb
Fedoraproject fedora
Mariadb mariadb
CPE cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5157

Mitre link : CVE-2023-5157

CVE.ORG link : CVE-2023-5157


JSON object : View

Products Affected

redhat

  • enterprise_linux_for_arm_64_eus
  • enterprise_linux_for_ibm_z_systems
  • enterprise_linux_for_power_little_endian
  • enterprise_linux_for_power_little_endian_eus
  • enterprise_linux_for_ibm_z_systems_eus
  • enterprise_linux_server_tus
  • enterprise_linux_for_arm_64
  • enterprise_linux_server_aus
  • enterprise_linux
  • enterprise_linux_eus

fedoraproject

  • fedora

mariadb

  • mariadb
CWE
CWE-400

Uncontrolled Resource Consumption

NVD-CWE-noinfo