Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-5157: Uncontrolled Resource Consumption in Red Hat Red Hat Enterprise Linux 8

0
High
VulnerabilityCVE-2023-5157cvecve-2023-5157
Published: Tue Sep 26 2023 (09/26/2023, 13:25:24 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.

AI-Powered Analysis

AILast updated: 10/04/2025, 10:45:05 UTC

Technical Analysis

CVE-2023-5157 is a high-severity vulnerability affecting MariaDB instances running on Red Hat Enterprise Linux 8. The vulnerability arises from uncontrolled resource consumption triggered by an OpenVAS port scan targeting MariaDB's default ports 3306 and 4567. Specifically, a malicious remote client can send crafted requests during such scans that cause the MariaDB service to consume excessive system resources, leading to a denial of service (DoS) condition. This vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS 3.1 score is 7.5, reflecting a network attack vector with low attack complexity, no privileges required, no user interaction, and an impact limited to availability. No known exploits are currently reported in the wild. The vulnerability is notable because it can be triggered remotely without authentication, making exposed MariaDB services on Red Hat Enterprise Linux 8 systems vulnerable to disruption by attackers conducting automated scans or targeted attacks. The lack of specific affected versions or patch links suggests that users should monitor Red Hat advisories closely for updates. The vulnerability highlights the risk of exposing database services directly to the internet without adequate protections, as automated scanning tools like OpenVAS can inadvertently or maliciously trigger service outages.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical database services running MariaDB on Red Hat Enterprise Linux 8. Many enterprises, government agencies, and service providers in Europe rely on Red Hat Enterprise Linux for their server infrastructure, including database hosting. A successful exploitation could disrupt business operations, cause downtime for web applications, internal systems, or customer-facing services, and potentially lead to financial losses and reputational damage. Sectors such as finance, healthcare, public administration, and telecommunications, which often use Red Hat platforms and MariaDB, could be particularly impacted. Additionally, the vulnerability could be exploited as part of a broader denial-of-service campaign or as a distraction technique during multi-vector attacks. The fact that exploitation requires no authentication and no user interaction increases the risk of opportunistic attacks by automated scanners or less sophisticated threat actors. Organizations with exposed MariaDB ports on their perimeter networks are at higher risk, especially if they lack proper network segmentation or intrusion detection capabilities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately audit network exposure of MariaDB services and restrict access to trusted internal networks or VPNs, blocking external access to ports 3306 and 4567 at firewalls or perimeter devices. 2) Apply any available patches or updates from Red Hat and MariaDB as soon as they are released; monitor Red Hat security advisories for CVE-2023-5157 updates. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to detect and block suspicious scanning activity, including OpenVAS or other port scanning tools targeting database ports. 4) Implement rate limiting and connection throttling on database services to reduce the impact of resource exhaustion attempts. 5) Harden MariaDB configurations by disabling unnecessary services or ports, and optimize resource usage parameters to prevent excessive consumption under attack. 6) Conduct regular vulnerability scanning and penetration testing internally to identify exposure and validate defenses. 7) Maintain comprehensive monitoring and alerting on database service availability and resource utilization to enable rapid incident response. These targeted steps go beyond generic advice by focusing on network exposure reduction, proactive detection of scanning activity, and configuration hardening specific to MariaDB on Red Hat Enterprise Linux 8.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-09-25T08:31:06.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c1b66c7f7acdd3e93a

Added to database: 10/4/2025, 10:15:29 AM

Last enriched: 10/4/2025, 10:45:05 AM

Last updated: 10/16/2025, 11:35:34 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats