Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2009-4484

Back to Search

SUSE Linux Security Vulnerability: CVE-2009-4484

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
12/30/2009
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

Solution(s)

  • suse-upgrade-mysql
  • suse-upgrade-mysql-bench
  • suse-upgrade-mysql-client
  • suse-upgrade-mysql-devel
  • suse-upgrade-mysql-max
  • suse-upgrade-mysql-shared
  • suse-upgrade-mysql-shared-32bit
  • suse-upgrade-mysql-shared-64bit
  • suse-upgrade-mysql-shared-x86
  • suse-upgrade-sap-aio-release

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;