Lucene search

K
saintSAINT CorporationSAINT:D505D53863BE216621FDAECA22896071
HistoryMar 10, 2008 - 12:00 a.m.

MySQL yaSSL SSL Hello message buffer overflow

2008-03-1000:00:00
SAINT Corporation
my.saintcorporation.com
321

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.974

Percentile

99.9%

Added: 03/10/2008
CVE: CVE-2008-0226
BID: 27140
OSVDB: 41935

Background

MySQL is an open-source database software package available for multiple platforms. yaSSL is an SSL library. MySQL, if SSL support is enabled, uses yaSSL by default.

Problem

A buffer overflow vulnerability in the **ProcessOldClientHello** function in yaSSL allows an attacker to execute arbitrary commands by sending a specially crafted Hello packet to the MySQL server.

Resolution

Upgrade to MySQL 5.1.23 or higher.

References

<http://www.securityfocus.com/archive/1/485810&gt;

Limitations

Exploit works on MySQL Server 5.0.20a. The target MySQL server must be configured to use an SSL certificate.

Platforms

Windows 2000
Windows Server 2003
Linux

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.974

Percentile

99.9%