Oracle MySQL 5.5.x < 5.5.49 X.509 Certificate Security Bypass
Medium Nessus Network Monitor Plugin ID 9607
SynopsisThe remote database server is vulnerable to a security bypass attack vector.
DescriptionThe version of MySQL installed on the remote host is version 5.5.x prior to 5.5.49 and is affected by a flaw related to certificate validation. The issue is due to the server hostname not being verified to match a domain name in the X.509 certificate. By spoofing the TLS/SSL server via a certificate that appears valid, an attacker with the ability to intercept network traffic (e.g. Man-in-the-Middle, DNS cache poisoning) can disclose and optionally manipulate transmitted data.
SolutionUpgrade to MySQL 5.5.49 or later.