7.5
CVSSv2

CVE-2009-4484

Published: 30/12/2009 Updated: 14/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL prior to 1.9.9, as used in mysqld in MySQL 5.0.x prior to 5.0.90, MySQL 5.1.x prior to 5.1.43, MySQL 5.5.x up to and including 5.5.0-m2, and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle mysql 5.0.0

oracle mysql

wolfssl yassl

canonical ubuntu linux 10.10

canonical ubuntu linux 11.04

canonical ubuntu linux 11.10

canonical ubuntu linux 9.04

canonical ubuntu linux 8.10

canonical ubuntu linux 9.10

canonical ubuntu linux 8.04

canonical ubuntu linux 10.04

canonical ubuntu linux 6.06

debian debian linux 5.0

debian debian linux 4.0

debian debian linux 6.0

mariadb mariadb

Vendor Advisories

Several vulnerabilities have been discovered in the MySQL database server The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4019 Domas Mituzas discovered that mysqld does not properly handle errors during execution of certain SELECT statements with subqueries, and does not preserve certain null_value fla ...
It was discovered that MySQL could be made to overwrite existing table files in the data directory An authenticated user could use the DATA DIRECTORY and INDEX DIRECTORY options to possibly bypass privilege checks This update alters table creation behaviour by disallowing the use of the MySQL data directory in DATA DIRECTORY and INDEX DIRECTORY o ...

Exploits

## # $Id: mysql_yassl_getnamerb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' cl ...

References

CWE-787http://www.intevydis.com/blog/?p=57http://intevydis.com/vd-list.shtmlhttp://www.securityfocus.com/bid/37640http://archives.neohapsis.com/archives/dailydave/2010-q1/0002.htmlhttp://isc.sans.org/diary.html?storyid=7900http://intevydis.com/mysql_demo.htmlhttp://www.intevydis.com/blog/?p=106http://securitytracker.com/id?1023402http://bazaar.launchpad.net/~mysql/mysql-server/mysql-5.0/revision/2837.1.1http://www.vupen.com/english/advisories/2010/0233http://www.metasploit.com/modules/exploit/linux/mysql/mysql_yassl_getnamehttp://securitytracker.com/id?1023513http://www.yassl.com/news.html#yassl199http://yassl.cvs.sourceforge.net/viewvc/yassl/yassl/taocrypt/src/asn.cpp?r1=1.13&r2=1.14http://secunia.com/advisories/38364http://lists.immunitysec.com/pipermail/dailydave/2010-January/006020.htmlhttp://intevydis.com/mysql_overflow1.py.txthttp://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.htmlhttp://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.htmlhttp://secunia.com/advisories/37493http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.htmlhttp://secunia.com/advisories/38344http://bugs.mysql.com/bug.php?id=50227http://lists.mysql.com/commits/96697http://www.vupen.com/english/advisories/2010/0236http://www.securityfocus.com/bid/37974http://www.yassl.com/release.htmlhttp://www.securityfocus.com/bid/37943http://www.osvdb.org/61956https://bugzilla.redhat.com/show_bug.cgi?id=555313http://www.debian.org/security/2010/dsa-1997http://secunia.com/advisories/38573http://secunia.com/advisories/38517http://ubuntu.com/usn/usn-897-1https://exchange.xforce.ibmcloud.com/vulnerabilities/55416http://www.ubuntu.com/usn/USN-1397-1https://nvd.nist.govhttps://www.debian.org/security/./dsa-1997https://usn.ubuntu.com/1397-1/https://www.exploit-db.com/exploits/16850/