CVE Vulnerabilities

CVE-2017-10788

Use After Free

Published: Jul 01, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9.8 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW

The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Dbd-mysql Dbd-mysql_project * 4.043 (including)
Libdbd-mysql-perl Ubuntu artful *
Libdbd-mysql-perl Ubuntu esm-apps/xenial *
Libdbd-mysql-perl Ubuntu esm-infra-legacy/trusty *
Libdbd-mysql-perl Ubuntu precise/esm *
Libdbd-mysql-perl Ubuntu trusty *
Libdbd-mysql-perl Ubuntu trusty/esm *
Libdbd-mysql-perl Ubuntu upstream *
Libdbd-mysql-perl Ubuntu xenial *
Libdbd-mysql-perl Ubuntu yakkety *
Libdbd-mysql-perl Ubuntu zesty *

Potential Mitigations

References