CVE-2016-6662: Remote Root Code Execution / Privilege Escalation

Bug #1622603 reported by Moritz
280
This bug affects 5 people
Affects Status Importance Assigned to Milestone
Percona Server moved to https://jira.percona.com/projects/PS
Fix Released
Undecided
Unassigned
Gentoo Linux
Unknown
Unknown

Bug Description

According to
http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
Percona MySQL Server is vulnerable to a remote root exploit discussed there (inclusing PoC).

The advisory states that the following versions are affected:
> MySQL <= 5.7.15
> 5.6.33
> 5.5.52

It further states:
> The vulnerability was reported to Oracle on 29th of July 2016 and triaged by the security team.
> It was also reported to the other affected vendors including PerconaDB and MariaDB.
>
> The vulnerabilities were patched by PerconaDB and MariaDB vendors by the end of 30th of August.
> During the course of the patching by these vendors the patches went into public repositories and the fixed security issues were also mentioned in the new releases which could be noticed by malicious attackers.

Looking at Percona Server 5.7 release notes at
https://www.percona.com/doc/percona-server/5.7/release-notes/release-notes_index.html
the latest available release (at the time of writing) is Percona Server 5.7.14-7, released on August 23rd, 2016. The release notes for this particular version do not reference CVE-2016-6662.

Is it correct that there is currently no patched release available for Percona (MySQL) Server?

Which mitigation strategies (other than what is discussed in the researchers' advisory) do you recommend?

While this is a bug report which refers to a security vulnerability, please do keep it open to the public since this is already public information. (I will post it privately so as to notify your security team, then make it public if Launchpad allows me to do so.)

Thank you.

Tags: security

CVE References

Revision history for this message
Moritz (moritz-naumann) wrote :
information type: Private Security → Public Security
Revision history for this message
Thomas Deutschmann (whissi) wrote :

On Gentoo we migrated the old bug report into a tracker bug; Updating remote watch to reflect the new bug report for dev-db/percona-server on Gentoo.

Revision history for this message
Roel Van de Paar (roel11) wrote :
Revision history for this message
Laurynas Biveinis (laurynas-biveinis) wrote :

Percona Server version 5.7.14-7 contains a fix, although the release notes do not reference the CVE number. More information at the blog post link posted above, closing the bug now - please reopen should you have any concerns.

Changed in percona-server:
status: New → Fix Released
Revision history for this message
Shahriyar Rzayev (rzayev-sehriyar) wrote :

Percona now uses JIRA for bug reports so this bug report is migrated to: https://jira.percona.com/browse/PS-3554

To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.