Lucene search

K
nvd[email protected]NVD:CVE-2008-0226
HistoryJan 10, 2008 - 11:46 p.m.

CVE-2008-0226

2008-01-1023:46:00
CWE-119
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.974 High

EPSS

Percentile

99.9%

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) “input_buffer& operator>>” in yassl_imp.cpp.

Affected configurations

NVD
Node
yasslyasslRange1.7.5
Node
mysqlmysqlMatch5.0.0
OR
mysqlmysqlMatch5.0.1
OR
mysqlmysqlMatch5.0.2
OR
mysqlmysqlMatch5.0.3
OR
mysqlmysqlMatch5.0.4
OR
mysqlmysqlMatch5.0.5
OR
mysqlmysqlMatch5.0.10
OR
mysqlmysqlMatch5.0.15
OR
mysqlmysqlMatch5.0.16
OR
mysqlmysqlMatch5.0.17
OR
mysqlmysqlMatch5.0.20
OR
mysqlmysqlMatch5.0.24
OR
mysqlmysqlMatch5.0.30
OR
mysqlmysqlMatch5.0.36
OR
mysqlmysqlMatch5.0.44
OR
mysqlmysqlMatch5.0.54
OR
mysqlmysqlMatch5.0.56
OR
mysqlmysqlMatch5.0.60
OR
mysqlmysqlMatch5.0.66
OR
mysqlmysqlMatch5.1.5
OR
oraclemysqlMatch5.0.23
OR
oraclemysqlMatch5.0.25
OR
oraclemysqlMatch5.0.26
OR
oraclemysqlMatch5.0.28
OR
oraclemysqlMatch5.0.30sp1
OR
oraclemysqlMatch5.0.32
OR
oraclemysqlMatch5.0.34
OR
oraclemysqlMatch5.0.36sp1
OR
oraclemysqlMatch5.0.38
OR
oraclemysqlMatch5.0.40
OR
oraclemysqlMatch5.0.41
OR
oraclemysqlMatch5.0.42
OR
oraclemysqlMatch5.0.44sp1
OR
oraclemysqlMatch5.0.45
OR
oraclemysqlMatch5.0.46
OR
oraclemysqlMatch5.0.48
OR
oraclemysqlMatch5.0.50
OR
oraclemysqlMatch5.0.50sp1
OR
oraclemysqlMatch5.0.51
OR
oraclemysqlMatch5.0.52
OR
oraclemysqlMatch5.0.56sp1
OR
oraclemysqlMatch5.0.58
OR
oraclemysqlMatch5.0.60sp1
OR
oraclemysqlMatch5.0.62
OR
oraclemysqlMatch5.0.64
OR
oraclemysqlMatch5.0.66sp1
OR
oraclemysqlMatch5.1
OR
oraclemysqlMatch5.1.1
OR
oraclemysqlMatch5.1.2
OR
oraclemysqlMatch5.1.3
OR
oraclemysqlMatch5.1.4
OR
oraclemysqlMatch5.1.6
OR
oraclemysqlMatch5.1.7
OR
oraclemysqlMatch5.1.8
OR
oraclemysqlMatch5.1.9
OR
oraclemysqlMatch5.1.10
OR
oraclemysqlMatch5.1.11
OR
oraclemysqlMatch5.1.12
OR
oraclemysqlMatch5.1.13
OR
oraclemysqlMatch5.1.14
OR
oraclemysqlMatch5.1.15
OR
oraclemysqlMatch5.1.16
OR
oraclemysqlMatch5.1.17
OR
oraclemysqlMatch5.1.18
OR
oraclemysqlMatch5.1.19
OR
oraclemysqlMatch5.1.20
OR
oraclemysqlMatch5.1.21
OR
oraclemysqlMatch5.1.22
Node
applemac_os_xMatch10.5.4
Node
debiandebian_linuxMatch5.0
Node
canonicalubuntu_linuxMatch6.06lts
OR
canonicalubuntu_linuxMatch6.10
OR
canonicalubuntu_linuxMatch7.04
OR
canonicalubuntu_linuxMatch7.10

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.974 High

EPSS

Percentile

99.9%