Description
An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x before 11.8.6, and 12.x before 12.2.2. If the caching_sha2_password authentication plugin is installed, and some user accounts are configured to use it, a large packet can crash the server because sha256_crypt_r uses alloca.
Published: 2026-04-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

A defect in the caching_sha2_password authentication plugin causes the server to crash when it receives an excessively large packet during the authentication process. The bug arises because the sha256_crypt_r routine uses the alloca function, which can exhaust stack resources, leading to an abrupt termination of the MariaDB Server process. The result is a denial‑of‑service condition that disrupts database availability for all users.

Affected Systems

MariaDB Server versions prior to 11.4.10, all 11.5.x releases up to and including 11.8.5, and 12.x versions preceding 12.2.2 are affected when the caching_sha2_password authentication plugin is installed and user accounts are configured to use it.

Risk and Exploitability

The entry has a CVSS score of 6.5, indicating a moderate severity, and an EPSS score of less than 1%, suggesting a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. The vulnerability is exploitable remotely by any client that can establish a connection to the server and supply a large packet during authentication with the caching_sha2_password plugin. The attack requires no privileged credentials and results only in service disruption; the attacker loses confidentiality and integrity is not affected. The likely attack vector is network‑based, so any exposed MariaDB instance could be vulnerable if the plugin is active.

Generated by OpenCVE AI on April 7, 2026 at 02:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MariaDB Server to version 11.4.10 or later, 11.5.x through 11.8.x up to 11.8.6, or 12.x 12.2.2 or later.
  • If an upgrade is not immediately possible, disable the caching_sha2_password authentication plugin or reconfigure user accounts to use a different authentication plugin.
  • Monitor database logs for unusually large authentication packets and apply additional network filtering if necessary.
  • Apply any vendor‑issued hotfixes or security patches promptly.

Generated by OpenCVE AI on April 7, 2026 at 02:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Large Packet Crashes MariaDB Server via caching_sha2_password Plugin MariaDB Server: MariaDB Server: Denial of Service via large packet with caching_sha2_password authentication plugin
Weaknesses CWE-770
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Large Packet Crashes MariaDB Server via caching_sha2_password Plugin
First Time appeared Mariadb
Mariadb mariadb
Vendors & Products Mariadb
Mariadb mariadb

Fri, 03 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in MariaDB Server before 11.4.10, 11.5.x through 11.8.x before 11.8.6, and 12.x before 12.2.2. If the caching_sha2_password authentication plugin is installed, and some user accounts are configured to use it, a large packet can crash the server because sha256_crypt_r uses alloca.
Weaknesses CWE-789
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T14:34:04.466Z

Reserved: 2026-04-03T05:00:17.626Z

Link: CVE-2026-35549

cve-icon Vulnrichment

Updated: 2026-04-03T14:33:57.055Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T05:16:23.160

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-35549

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T05:00:18Z

Links: CVE-2026-35549 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:55:11Z

Weaknesses