Uploaded image for project: 'MariaDB Server'
  1. MariaDB Server
  2. MDEV-3915

COM_CHANGE_USER allows fast password brute-forcing

    XMLWordPrintable

Details

    • Bug
    • Status: Closed (View Workflow)
    • Major
    • Resolution: Fixed
    • 5.5.28a, 5.3.11, 5.2.13, 5.1.66
    • 5.5.29, 5.2.14, 5.3.12
    • None
    • None

    Description

      If one tries to connect with an incorrect password, the connection is aborted, one has to connect again to try a new password. But if one tries an incorrect password with the COM_CHANGE_USER command, he is not disconnected, which allows to brute-force passwords faster. Additionally, all COM_CHANGE_USER issued in a connection use the same scramble value.

      We can fix it by allowing only three (or any other small fixed number?) of failed COM_CHANGE_USER in a connection.

      It probably shouldn't be "three fails in a row", because one would be able to alternate between two known accounts and continue trying other password.

      Additionally we might add a one second (or any other short fixed time duration) delay after a failed connection or a COM_CHANGE_USER attempt.

      Attachments

        Activity

          People

            serg Sergei Golubchik
            serg Sergei Golubchik
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Git Integration

                Error rendering 'com.xiplink.jira.git.jira_git_plugin:git-issue-webpanel'. Please contact your Jira administrators.