Vigil@nce: MySQL, buffer overflow via yaSSL
February 2010 by Vigil@nce
When MySQL is compiled with yaSSL, an attacker can send an invalid
certificate, in order to generate a denial of service or to
execute code.
– Severity: 2/4
– Consequences: user access/rights, denial of service of service
– Provenance: intranet client
– Means of attack: 1 attack
– Ability of attacker: technician (2/4)
– Confidence: confirmed by the editor (5/5)
– Diffusion of the vulnerable configuration: medium (2/3)
– Creation date: 26/01/2010
– Revision date: 28/01/2010
IMPACTED PRODUCTS
– MySQL Community Server
– MySQL Enterprise
DESCRIPTION OF THE VULNERABILITY
The yaSSL library implements SSL. MySQL contains a copy of yaSSL.
When MySQL is compiled with yaSSL (./configure —with-ssl), it is
thus impacted by the VIGILANCE-VUL-9384 vulnerability.
An attacker can therefore send an invalid certificate, in order to
generate a denial of service or to execute code on applications
linked with yaSSL.
CHARACTERISTICS
– Identifiers: BID-37943, CVE-2009-4484, VIGILANCE-VUL-9380
Pointed by: VIGILANCE-VUL-9000, VIGILANCE-VUL-9384
– Url: http://vigilance.fr/vulnerability/MySQL-buffer-overflow-via-yaSSL-9380