// For flags

CVE-2021-46665

mariadb: MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.

MariaDB versiones hasta 10.5.9, permite un bloqueo de la aplicaciĆ³n sql_parse.cc debido a expectativas incorrectas de used_tables

Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.34 in Ubuntu 20.04 LTS and to 10.5.15 in Ubuntu 21.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-01 CVE Reserved
  • 2022-02-01 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.2.0 < 10.2.43
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.2.0 < 10.2.43"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.3.0 < 10.3.34
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.3.0 < 10.3.34"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.4.0 < 10.4.24
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.4.0 < 10.4.24"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.5.0 < 10.5.15
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.5.0 < 10.5.15"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.6.0 < 10.6.7
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.6.0 < 10.6.7"
-
Affected
Mariadb
Search vendor "Mariadb"
Mariadb
Search vendor "Mariadb" for product "Mariadb"
>= 10.7.0 < 10.7.3
Search vendor "Mariadb" for product "Mariadb" and version " >= 10.7.0 < 10.7.3"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
36
Search vendor "Fedoraproject" for product "Fedora" and version "36"
-
Affected