CVE Vulnerabilities

CVE-2023-5157

Uncontrolled Resource Consumption

Published: Sep 27, 2023 | Modified: Oct 01, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
MariadbMariadb*10.3.36 (excluding)
MariadbMariadb10.4.0 (including)10.4.26 (excluding)
MariadbMariadb10.5.0 (including)10.5.17 (excluding)
MariadbMariadb10.6.0 (including)10.6.9 (excluding)
MariadbMariadb10.7.0 (including)10.7.5 (excluding)
MariadbMariadb10.8.0 (including)10.8.4 (excluding)
Red Hat Enterprise Linux 8RedHatmariadb:10.3-8080020230814130040.63b34585*
Red Hat Enterprise Linux 8RedHatmariadb:10.5-8080020231003163755.63b34585*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatmariadb:10.5-8040020231006044227.522a0ee4*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatmariadb:10.5-8040020231006044227.522a0ee4*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatmariadb:10.5-8040020231006044227.522a0ee4*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatmariadb:10.5-8060020231005052631.ad008a3a*
Red Hat Enterprise Linux 9RedHatgalera-0:26.4.14-1.el9_2*
Red Hat Enterprise Linux 9RedHatmariadb-3:10.5.22-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatgalera-0:26.4.14-1.el9_0*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatmariadb-3:10.5.22-1.el9_0*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-mariadb105-galera-0:26.4.14-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-mariadb105-mariadb-3:10.5.22-1.el7*
Galera-4Ubuntuesm-apps/jammy*
Galera-4Ubuntujammy*
Galera-4Ubuntuupstream*
MariadbUbuntubionic*
MariadbUbuntulunar*
MariadbUbuntutrusty*
MariadbUbuntuupstream*
MariadbUbuntuxenial*
Mariadb-10.3Ubuntuesm-apps/focal*
Mariadb-10.3Ubuntufocal*
Mariadb-10.3Ubuntuupstream*
Mariadb-10.6Ubuntuupstream*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References