Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2009-4484 — Out-of-bounds Write in Oracle Mysql
Severity
7.5HIGHNVD
EPSS
75.8%
top 1.09%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 30
Latest updateMay 2
Description
Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1…
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages5 packages
Also affects: Debian Linux 4.0, 5.0, 6.0, Ubuntu Linux 10.04, 10.10, 11.04, 11.10, 6.06, 8.04, 8.10, 9.04, 9.10
Patches
🔴Vulnerability Details
1GHSA▶
GHSA-r9xr-rjgc-3q5h: Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn↗2022-05-02