Impact
A flaw exists in MariaDB Server versions before certain release points, affecting configurations that use the caching_sha2_password authentication plugin. Sending a specially crafted large packet triggers a crash because the sha256_crypt_r function allocates memory on the stack with alloca based on packet size, leading to a stack buffer overflow. The result is a denial of service, where the database process terminates and must be restarted, affecting availability for all users on the affected instance.
Affected Systems
The vulnerability applies to MariaDB Server from MariaDB across multiple series. Specifically, all 11.4.x releases older than 11.4.10, every 11.5.x release, every 11.6.x and 11.7.x release, all 11.8.x releases older than 11.8.6, and all 12.0.x, 12.1.x, and 12.2.x releases older than 12.2.2 are vulnerable when the caching_sha2_password plugin is enabled for any account.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate risk. No EPSS score is available, so the exploitation frequency is unclear. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would need remote access to the MariaDB server and an account that authenticates via caching_sha2_password to send an oversized packet, making exposed or compromised database instances the most likely targets; isolated internal deployments are less vulnerable.
OpenCVE Enrichment