CVE-2008-0226

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

References

http://bugs.mysql.com/33814

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html

http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

http://secunia.com/advisories/28324

http://secunia.com/advisories/28419

http://secunia.com/advisories/28597

http://secunia.com/advisories/29443

http://secunia.com/advisories/32222

http://securityreason.com/securityalert/3531

http://support.apple.com/kb/HT3216

http://www.debian.org/security/2008/dsa-1478

http://www.mandriva.com/security/advisories?name=MDVSA-2008:150

http://www.securityfocus.com/archive/1/485810/100/0/threaded

http://www.securityfocus.com/archive/1/485811/100/0/threaded

http://www.securityfocus.com/bid/27140

http://www.securityfocus.com/bid/31681

http://www.ubuntu.com/usn/usn-588-1

http://www.vupen.com/english/advisories/2008/0560/references

http://www.vupen.com/english/advisories/2008/2780

https://exchange.xforce.ibmcloud.com/vulnerabilities/39429

https://exchange.xforce.ibmcloud.com/vulnerabilities/39431

Details

Source: MITRE

Published: 2008-01-10

Updated: 2019-12-17

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:* versions up to 1.7.5 (inclusive)

Configuration 2

OR

cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*

cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
17814yaSSL 1.7.5 Buffer OverflowNessusDatabases
high
36561Mandriva Linux Security Advisory : mysql (MDVSA-2008:150)NessusMandriva Local Security Checks
high
34374Mac OS X Multiple Vulnerabilities (Security Update 2008-007)NessusMacOS X Local Security Checks
critical
34159MySQL Community Server 5.0 < 5.0.67 Multiple VulnerabilitiesNessusDatabases
high
31783Ubuntu 6.06 LTS : mysql-dfsg-5.0 regression (USN-588-2)NessusUbuntu Local Security Checks
high
31638Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : mysql-dfsg-5.0 vulnerabilities (USN-588-1)NessusUbuntu Local Security Checks
high
30125Debian DSA-1478-1 : mysql-dfsg-5.0 - buffer overflowsNessusDebian Local Security Checks
high