CVE-2023-36366

7.5 HIGH

📋 TL;DR

A vulnerability in MonetDB Server's log_create_delta component allows attackers to cause Denial of Service (DoS) by sending crafted SQL statements. This affects MonetDB Server versions 11.45.17 and 11.46.0, potentially disrupting database availability for applications using these versions.

💻 Affected Systems

Products:
  • MonetDB Server
Versions: 11.45.17 and 11.46.0
Operating Systems: All platforms running MonetDB
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database service disruption, making the database unavailable to all applications and users, potentially causing extended downtime.

🟠

Likely Case

Temporary service interruption requiring database restart, causing application errors and brief unavailability.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and response.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely via SQL queries without authentication.
🏢 Internal Only: MEDIUM - Requires network access but could be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted SQL statements, which is straightforward for attackers with database access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 11.45.17 and 11.46.0

Vendor Advisory: https://github.com/MonetDB/MonetDB/issues/7381

Restart Required: Yes

Instructions:

1. Check current MonetDB version. 2. Upgrade to latest stable version. 3. Restart MonetDB service. 4. Verify the fix.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict database access to trusted applications only using firewall rules.

iptables -A INPUT -p tcp --dport 50000 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 50000 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to limit database access to essential applications only.
  • Deploy WAF or database firewall to filter and monitor SQL queries for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Check MonetDB version: mclient -s "SELECT value FROM sys.env() WHERE name = 'monet_version';"

Check Version:

mclient -s "SELECT value FROM sys.env() WHERE name = 'monet_version';"

Verify Fix Applied:

Verify version is newer than affected versions and test with normal SQL operations.

📡 Detection & Monitoring

Log Indicators:

  • Database crash logs
  • Unexpected service restarts
  • Error messages related to log_create_delta

Network Indicators:

  • Unusual SQL query patterns from untrusted sources
  • Multiple connection attempts with crafted queries

SIEM Query:

source="monetdb.log" AND ("crash" OR "segfault" OR "log_create_delta")

🔗 References

📤 Share & Export