The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of MongoDB

computer vulnerability bulletin CVE-2018-16790

libbson: out-of-bounds memory reading via _bson_iter_next_internal

Synthesis of the vulnerability

An attacker can force a read at an invalid address via _bson_iter_next_internal() of libbson, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Fedora, MongoDB.
Severity: 2/4.
Consequences: data reading, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 11/09/2018.
Identifiers: CVE-2018-16790, FEDORA-2018-2062cd7548, FEDORA-2018-77d864ff39, VIGILANCE-VUL-27198.

Description of the vulnerability

An attacker can force a read at an invalid address via _bson_iter_next_internal() of libbson, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-15535

MongoDB: read-write access via Wire Protocol Compression

Synthesis of the vulnerability

An attacker can bypass access restrictions via Wire Protocol Compression of MongoDB, in order to read or alter data.
Impacted products: Fedora, MongoDB, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: intranet client.
Creation date: 02/11/2017.
Identifiers: CERTFR-2017-AVI-386, CVE-2017-15535, FEDORA-2017-774e7863a4, FEDORA-2017-913288e9a9, openSUSE-SU-2017:3018-1, openSUSE-SU-2017:3022-1, VIGILANCE-VUL-24311.

Description of the vulnerability

An attacker can bypass access restrictions via Wire Protocol Compression of MongoDB, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-12926

MongoDB: vulnerability

Synthesis of the vulnerability

A vulnerability of MongoDB was announced.
Impacted products: MongoDB.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: intranet client.
Creation date: 31/08/2017.
Identifiers: CERTFR-2017-AVI-276, CVE-2017-12926, VIGILANCE-VUL-23651, WT-2711.

Description of the vulnerability

A vulnerability of MongoDB was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-6494

MongoDB: information disclosure via dbshell

Synthesis of the vulnerability

A local attacker can read the ~/.dbshell file of a MongoDB user, in order to obtain sensitive information.
Impacted products: Debian, Fedora, MongoDB.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 01/08/2016.
Identifiers: 25335, CVE-2016-6494, DLA-588-1, DLA-588-2, FEDORA-2016-4cedbd4308, FEDORA-2016-89060100d7, VIGILANCE-VUL-20263.

Description of the vulnerability

The MongoDB product logs commands in the ~/.dbshell file.

However, this file is created world readable.

A local attacker can therefore read the ~/.dbshell file of a MongoDB user, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-7882

MongoDB Enterprise: privilege escalation via LDAP Authentication

Synthesis of the vulnerability

An attacker can use the LDAP authentication of MongoDB Enterprise, in order to escalate his privileges.
Impacted products: MongoDB.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 11/01/2016.
Identifiers: CVE-2015-7882, VIGILANCE-VUL-18677.

Description of the vulnerability

The MongoDB Enterprise product can be configured with a LDAP authentication.

However, an attacker can use it to access to MongoDB.

An attacker can therefore use the LDAP authentication of MongoDB Enterprise, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2015-2326

PCRE: buffer overflow of pcre_compile2

Synthesis of the vulnerability

An attacker can generate a buffer overflow in pcre_compile2 of PCRE, in order to trigger a denial of service, and possibly to execute code.
Impacted products: MongoDB, openSUSE, Solaris, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 12/05/2015.
Identifiers: bulletinjul2015, CERTFR-2015-AVI-265, CVE-2015-2326, openSUSE-SU-2015:0858-1, openSUSE-SU-2015:1216-1, RHSA-2016:2750-01, SERVER-18312, SSA:2015-162-02, SSA:2015-198-02, SUSE-SU-2015:1273-1, USN-2694-1, USN-2943-1, VIGILANCE-VUL-16880.

Description of the vulnerability

An attacker can generate a buffer overflow in pcre_compile2 of PCRE, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-2325

PCRE: buffer overflow of compile_branch

Synthesis of the vulnerability

An attacker can generate a buffer overflow in compile_branch of PCRE, in order to trigger a denial of service, and possibly to execute code.
Impacted products: BIG-IP Hardware, TMOS, MongoDB, openSUSE, openSUSE Leap, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 12/05/2015.
Identifiers: CERTFR-2015-AVI-265, CVE-2015-2325, openSUSE-SU-2015:0858-1, openSUSE-SU-2015:1216-1, openSUSE-SU-2016:3099-1, RHSA-2016:2750-01, SERVER-18312, SOL16983, SSA:2015-162-02, SSA:2015-198-02, SUSE-SU-2015:1273-1, USN-2694-1, USN-2943-1, VIGILANCE-VUL-16879.

Description of the vulnerability

An attacker can generate a buffer overflow in compile_branch of PCRE, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2015-2705

MongoDB: denial of service via Index Name

Synthesis of the vulnerability

An authenticated attacker can use an empty Index Name in MongoDB, in order to trigger a denial of service.
Impacted products: MongoDB.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: user account.
Creation date: 30/03/2015.
Identifiers: CVE-2015-2705, FG-VD-15-018, VIGILANCE-VUL-16494.

Description of the vulnerability

The MongoDB product implements a database supporting indexes.

However, if the name of an index is empty in "createIndexes", a fatal error occurs in the src/mongo/db/catalog/index_catalog.cpp file.

An authenticated attacker can therefore use an empty Index Name in MongoDB, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2015-2327 CVE-2015-2328

PCRE: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PCRE.
Impacted products: MongoDB, openSUSE Leap, RHEL, Nessus, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 27/03/2015.
Identifiers: CERTFR-2018-AVI-288, CVE-2015-2327, CVE-2015-2328, FG-VD-15-010, FG-VD-15-014, openSUSE-SU-2016:3099-1, RHSA-2016:1025-01, RHSA-2016:2750-01, TNS-2018-08, USN-2943-1, VIGILANCE-VUL-16482.

Description of the vulnerability

Several vulnerabilities were announced in PCRE.

An attacker can fill the stack memory, in order to trigger a denial of service. [severity:2/4; CVE-2015-2327, FG-VD-15-010]

An attacker can generate an infinite loop, in order to trigger a denial of service. [severity:2/4; CVE-2015-2328, FG-VD-15-014]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-1609

MongoDB: denial of service via BSON

Synthesis of the vulnerability

An attacker can send malformed BSON data to MongoDB, in order to trigger a denial of service.
Impacted products: Fedora, MongoDB, Splunk Enterprise.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: document.
Creation date: 05/03/2015.
Identifiers: CVE-2015-1609, FEDORA-2015-4197, SPL-106324, VIGILANCE-VUL-16329.

Description of the vulnerability

The MongoDB product supports the BSON (Binary JSON - Object Notation) format.

However, if a string ends with two '\0', a fatal error occurs in the src/mongo/bson/bson_validate.cpp file.

An attacker can therefore send malformed BSON data to MongoDB, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about MongoDB: