6.5
CVE-2026-35549
- EPSS 0.06%
- Veröffentlicht 03.04.2026 05:16:23
- Zuletzt bearbeitet 03.04.2026 16:10:23
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x before 11.8.6, and 12.x before 12.2.2. If the caching_sha2_password authentication plugin is installed, and some user accounts are configured to use it, a large packet can crash the server because sha256_crypt_r uses alloca.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerMariaDB
≫
Produkt
MariaDB
Default Statusunaffected
Version
0
Version <
11.4.10
Status
affected
Version
11.5.0
Version <
11.8.6
Status
affected
Version
12.0.0
Version <
12.2.2
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.177 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cve@mitre.org | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-789 Memory Allocation with Excessive Size Value
The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.