CVE-2009-4484 : Detail

CVE-2009-4484

Overflow
74.61%V4
Network
2009-12-30
20h00 +00:00
2018-01-04
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 16850

Publication date : 2010-04-29 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

Products Mentioned

Configuraton 0

Oracle>>Mysql >> Version From (including) 5.0.0 To (excluding) 5.0.90

Oracle>>Mysql >> Version From (including) 5.1.0 To (excluding) 5.1.43

Oracle>>Mysql >> Version 5.0.0

Oracle>>Mysql >> Version 5.0.0

Configuraton 0

Wolfssl>>Yassl >> Version To (excluding) 1.9.9

Configuraton 0

Canonical>>Ubuntu_linux >> Version 6.06

Canonical>>Ubuntu_linux >> Version 8.04

Canonical>>Ubuntu_linux >> Version 8.10

Canonical>>Ubuntu_linux >> Version 9.04

Canonical>>Ubuntu_linux >> Version 9.10

Canonical>>Ubuntu_linux >> Version 10.04

Canonical>>Ubuntu_linux >> Version 10.10

Canonical>>Ubuntu_linux >> Version 11.04

Canonical>>Ubuntu_linux >> Version 11.10

Configuraton 0

Debian>>Debian_linux >> Version 4.0

Debian>>Debian_linux >> Version 5.0

Debian>>Debian_linux >> Version 6.0

Configuraton 0

Mariadb>>Mariadb >> Version From (including) 5.1 To (excluding) 5.1.42

References

http://secunia.com/advisories/38573
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-1397-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/37493
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.yassl.com/release.html
Tags : x_refsource_CONFIRM
http://secunia.com/advisories/38364
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/38517
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/37974
Tags : vdb-entry, x_refsource_BID
http://securitytracker.com/id?1023513
Tags : vdb-entry, x_refsource_SECTRACK
http://ubuntu.com/usn/usn-897-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2010/0236
Tags : vdb-entry, x_refsource_VUPEN
http://bugs.mysql.com/bug.php?id=50227
Tags : x_refsource_CONFIRM
http://www.securityfocus.com/bid/37640
Tags : vdb-entry, x_refsource_BID
http://lists.mysql.com/commits/96697
Tags : mailing-list, x_refsource_MLIST
http://securitytracker.com/id?1023402
Tags : vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/61956
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/38344
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/37943
Tags : vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2010/0233
Tags : vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2010/dsa-1997
Tags : vendor-advisory, x_refsource_DEBIAN