National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-4484 Detail

Current Description

Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

Source:  MITRE      Last Modified:  12/30/2009      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2009-4484
Original release date:
12/30/2009
Last revised:
01/04/2018
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (01/26/2010)

Not vulnerable. This issue did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 3, 4, or 5. The packages use OpenSSL and not yaSSL.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://archives.neohapsis.com/archives/dailydave/2010-q1/0002.html External Source MLIST [dailydave] 20100106 0day demos
http://bazaar.launchpad.net/~mysql/mysql-server/mysql-5.0/revision/2837.1.1 External Source CONFIRM http://bazaar.launchpad.net/~mysql/mysql-server/mysql-5.0/revision/2837.1.1
http://bugs.mysql.com/bug.php?id=50227 External Source CONFIRM http://bugs.mysql.com/bug.php?id=50227
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.html External Source CONFIRM http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.html
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.html External Source CONFIRM http://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.html
http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html External Source MISC http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html
http://intevydis.com/mysql_demo.html External Source MISC http://intevydis.com/mysql_demo.html
http://intevydis.com/mysql_overflow1.py.txt External Source MISC http://intevydis.com/mysql_overflow1.py.txt
http://isc.sans.org/diary.html?storyid=7900 External Source MISC http://isc.sans.org/diary.html?storyid=7900
http://lists.immunitysec.com/pipermail/dailydave/2010-January/006020.html External Source MLIST [dailydave] 20100126 New db bugs
http://lists.mysql.com/commits/96697 External Source MLIST [commits] 20100113 bzr commit into mysql-5.0-bugteam branch (ramil:2838) Bug#50227
http://securitytracker.com/id?1023402 External Source SECTRACK 1023402
http://securitytracker.com/id?1023513 External Source SECTRACK 1023513
http://ubuntu.com/usn/usn-897-1 External Source UBUNTU USN-897-1
http://www.debian.org/security/2010/dsa-1997 External Source DEBIAN DSA-1997
http://www.intevydis.com/blog/?p=106 External Source MISC http://www.intevydis.com/blog/?p=106
http://www.intevydis.com/blog/?p=57 External Source MISC http://www.intevydis.com/blog/?p=57
http://www.metasploit.com/modules/exploit/linux/mysql/mysql_yassl_getname External Source MISC http://www.metasploit.com/modules/exploit/linux/mysql/mysql_yassl_getname
http://www.securityfocus.com/bid/37640 External Source BID 37640
http://www.securityfocus.com/bid/37943 External Source BID 37943
http://www.securityfocus.com/bid/37974 External Source BID 37974
http://www.ubuntu.com/usn/USN-1397-1 External Source UBUNTU USN-1397-1
http://www.vupen.com/english/advisories/2010/0233 External Source VUPEN ADV-2010-0233
http://www.vupen.com/english/advisories/2010/0236 External Source VUPEN ADV-2010-0236
http://www.yassl.com/news.html#yassl199 External Source CONFIRM http://www.yassl.com/news.html#yassl199
http://www.yassl.com/release.html External Source CONFIRM http://www.yassl.com/release.html
http://yassl.cvs.sourceforge.net/viewvc/yassl/yassl/taocrypt/src/asn.cpp?r1=1.13&r2=1.14 External Source CONFIRM http://yassl.cvs.sourceforge.net/viewvc/yassl/yassl/taocrypt/src/asn.cpp?r1=1.13&r2=1.14
https://bugzilla.redhat.com/show_bug.cgi?id=555313 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=555313
https://exchange.xforce.ibmcloud.com/vulnerabilities/55416 External Source XF mysql-unspecified-bo(55416)

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes