CVE-2009-4484 (CNNVD-200912-425)
中文标题:
MySQL yaSSL TaoCrypt的src/asn.cpp CertDecoder::GetName函数多个栈缓冲区错误漏洞
英文标题:
Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCryp...
漏洞描述
中文描述:
Oracle MySQL是美国甲骨文(Oracle)公司的一套开源的关系数据库管理系统。该数据库系统具有性能高、成本低、可靠性好等特点。 MySQL 5.0.90之前的5.0.x版本,MySQL 5.1.43之前的5.1.x版本,MySQL 5.5.x至5.5.0-m2版本的mysqld中使用的yaSSL 1.9.9之前版本中的TaoCrypt的src/asn.cpp中的CertDecoder::GetName函数中存在多个基于栈的缓冲区溢出漏洞。远程攻击者可通过建立一个SSL连接并发送带有特制名称字段的X.509客户端证书执行任意代码或者导致拒绝服务(内存破坏和守护程序崩溃)。
英文描述:
Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| oracle | mysql | * | - | - |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
| oracle | mysql | 5.0.0 | - | - |
cpe:2.3:a:oracle:mysql:5.0.0:milestone1:*:*:*:*:*:*
|
| wolfssl | yassl | * | - | - |
cpe:2.3:a:wolfssl:yassl:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 6.06 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 8.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 8.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 9.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 10.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 11.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 11.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
|
| debian | debian_linux | 4.0 | - | - |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 5.0 | - | - |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 6.0 | - | - |
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
|
| mariadb | mariadb | * | - | - |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2009-4484 |
2025-11-11 15:18:13 | 2025-11-11 07:33:04 |
| NVD | nvd_CVE-2009-4484 |
2025-11-11 14:53:01 | 2025-11-11 07:41:52 |
| CNNVD | cnnvd_CNNVD-200912-425 |
2025-11-11 15:09:08 | 2025-11-11 07:49:40 |
| EXPLOITDB | exploitdb_EDB-16850 |
2025-11-11 15:05:26 | 2025-11-11 08:11:15 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 36 -> 39
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-200912-425
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 16
- data_sources: ['cve'] -> ['cve', 'nvd']