An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://jira.mariadb.org/browse/MDEV-26353 | vendor advisory issue tracking exploit |
https://security.netapp.com/advisory/ntap-20220526-0005/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html | third party advisory mailing list |