CVE-2009-4484

Public Exploit

Description

Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.

Category

7.5
CVSS
Severity: High
CVSS 2.0 •
EPSS 70.17% Top 5%
Vendor Advisory ubuntu.com Vendor Advisory ubuntu.com Vendor Advisory debian.org Vendor Advisory mysql.com Vendor Advisory mysql.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://intevydis.com/mysql_overflow1.py.txt broken link
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.html broken link
http://secunia.com/advisories/38573 third party advisory
http://www.ubuntu.com/usn/USN-1397-1 third party advisory vendor advisory
http://secunia.com/advisories/37493 third party advisory
http://www.yassl.com/release.html broken link
http://www.yassl.com/news.html#yassl199 broken link
http://bazaar.launchpad.net/~mysql/mysql-server/mysql-5.0/revision/2837.1.1 broken link
http://www.intevydis.com/blog/?p=106 broken link
http://intevydis.com/mysql_demo.html broken link
http://intevydis.blogspot.com/2010/01/mysq-yassl-stack-overflow.html broken link
http://secunia.com/advisories/38364 third party advisory
http://secunia.com/advisories/38517 third party advisory
http://yassl.cvs.sourceforge.net/viewvc/yassl/yassl/taocrypt/src/asn.cpp?r1=1.13&r2=1.14 third party advisory
http://www.securityfocus.com/bid/37974 vdb entry third party advisory
http://securitytracker.com/id?1023513 vdb entry third party advisory
http://ubuntu.com/usn/usn-897-1 third party advisory vendor advisory
http://www.metasploit.com/modules/exploit/linux/mysql/mysql_yassl_getname third party advisory
http://www.vupen.com/english/advisories/2010/0236 vdb entry third party advisory
http://archives.neohapsis.com/archives/dailydave/2010-q1/0002.html mailing list broken link
https://bugzilla.redhat.com/show_bug.cgi?id=555313 issue tracking third party advisory
http://bugs.mysql.com/bug.php?id=50227 issue tracking exploit vendor advisory
http://www.securityfocus.com/bid/37640 vdb entry third party advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/55416 vdb entry third party advisory
http://www.intevydis.com/blog/?p=57 broken link
http://isc.sans.org/diary.html?storyid=7900 third party advisory
http://lists.mysql.com/commits/96697 mailing list patch vendor advisory
http://securitytracker.com/id?1023402 vdb entry third party advisory
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.html broken link
http://www.osvdb.org/61956 vdb entry broken link
http://intevydis.com/vd-list.shtml broken link
http://secunia.com/advisories/38344 third party advisory
http://www.securityfocus.com/bid/37943 vdb entry third party advisory
http://www.vupen.com/english/advisories/2010/0233 vdb entry third party advisory
http://lists.immunitysec.com/pipermail/dailydave/2010-January/006020.html mailing list broken link
http://www.debian.org/security/2010/dsa-1997 third party advisory vendor advisory

Frequently Asked Questions

What is the severity of CVE-2009-4484?
CVE-2009-4484 has been scored as a high severity vulnerability.
How to fix CVE-2009-4484?
To fix CVE-2009-4484, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2009-4484 being actively exploited in the wild?
It is possible that CVE-2009-4484 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~70% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.