#VU42507 Resource management error in MongoDB


Published: 2020-08-11

Vulnerability identifier: #VU42507

Vulnerability risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:N/AC:L/PR:/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2013-3969

CWE-ID: CWE-399

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
MongoDB
Server applications / Database software

Vendor: MongoDB, Inc.

Description

The vulnerability allows a remote #AU# to read and manipulate data.

The find prototype in scripting/engine_v8.h in MongoDB 2.4.0 through 2.4.4 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and server crash) or possibly execute arbitrary code via an invalid RefDB object.

Mitigation
Install update from vendor's website.

Vulnerable software versions

MongoDB: 2.4.0 - 2.4.4


External links
http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/
http://secunia.com/advisories/54170
http://www.mongodb.org/about/alerts/
http://www.openwall.com/lists/oss-security/2013/07/30/10
http://jira.mongodb.org/browse/SERVER-9878


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability