[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2009-4484Date: (C)2009-12-30   (M)2024-02-22


Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1023402
SECTRACK-1023513
SECUNIA-37493
BID-37640
BID-37943
BID-37974
SECUNIA-38344
SECUNIA-38364
SECUNIA-38517
SECUNIA-38573
OSVDB-61956
ADV-2010-0233
ADV-2010-0236
DSA-1997
USN-1397-1
USN-897-1
http://lists.mysql.com/commits/96697
http://archives.neohapsis.com/archives/dailydave/2010-q1/0002.html
http://lists.immunitysec.com/pipermail/dailydave/2010-January/006020.html
http://bazaar.launchpad.net/~mysql/mysql-server/mysql-5.0/revision/2837.1.1
http://bugs.mysql.com/bug.php?id=50227
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.html
http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html
http://intevydis.com/mysql_demo.html
http://intevydis.com/mysql_overflow1.py.txt
http://intevydis.com/vd-list.shtml
http://isc.sans.org/diary.html?storyid=7900
http://www.intevydis.com/blog/?p=106
http://www.intevydis.com/blog/?p=57
http://www.metasploit.com/modules/exploit/linux/mysql/mysql_yassl_getname
http://www.yassl.com/news.html#yassl199
http://www.yassl.com/release.html
http://yassl.cvs.sourceforge.net/viewvc/yassl/yassl/taocrypt/src/asn.cpp?r1=1.13&r2=1.14
https://bugzilla.redhat.com/show_bug.cgi?id=555313
mysql-unspecified-bo(55416)

CWE    1
CWE-787
OVAL    3
oval:org.secpod.oval:def:700072
oval:org.mitre.oval:def:6799
oval:org.secpod.oval:def:700805

© SecPod Technologies