CVE-2008-0226

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
References
Link Resource
http://bugs.mysql.com/33814 Permissions Required
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html Not Applicable
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/28324 Not Applicable
http://secunia.com/advisories/28419 Not Applicable
http://secunia.com/advisories/28597 Not Applicable
http://secunia.com/advisories/29443 Not Applicable
http://secunia.com/advisories/32222 Not Applicable
http://securityreason.com/securityalert/3531 Third Party Advisory
http://support.apple.com/kb/HT3216 Third Party Advisory
http://www.debian.org/security/2008/dsa-1478 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 Broken Link
http://www.securityfocus.com/archive/1/485810/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/485811/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/27140 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31681 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-588-1 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0560/references Permissions Required
http://www.vupen.com/english/advisories/2008/2780 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/39429 VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/39431 VDB Entry
http://bugs.mysql.com/33814 Permissions Required
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html Not Applicable
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html Mailing List Third Party Advisory
http://secunia.com/advisories/28324 Not Applicable
http://secunia.com/advisories/28419 Not Applicable
http://secunia.com/advisories/28597 Not Applicable
http://secunia.com/advisories/29443 Not Applicable
http://secunia.com/advisories/32222 Not Applicable
http://securityreason.com/securityalert/3531 Third Party Advisory
http://support.apple.com/kb/HT3216 Third Party Advisory
http://www.debian.org/security/2008/dsa-1478 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 Broken Link
http://www.securityfocus.com/archive/1/485810/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/485811/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/27140 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31681 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-588-1 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0560/references Permissions Required
http://www.vupen.com/english/advisories/2008/2780 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/39429 VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/39431 VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*
cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://bugs.mysql.com/33814 - Permissions Required () http://bugs.mysql.com/33814 - Permissions Required
References () http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html - Not Applicable () http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html - Not Applicable
References () http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/28324 - Not Applicable () http://secunia.com/advisories/28324 - Not Applicable
References () http://secunia.com/advisories/28419 - Not Applicable () http://secunia.com/advisories/28419 - Not Applicable
References () http://secunia.com/advisories/28597 - Not Applicable () http://secunia.com/advisories/28597 - Not Applicable
References () http://secunia.com/advisories/29443 - Not Applicable () http://secunia.com/advisories/29443 - Not Applicable
References () http://secunia.com/advisories/32222 - Not Applicable () http://secunia.com/advisories/32222 - Not Applicable
References () http://securityreason.com/securityalert/3531 - Third Party Advisory () http://securityreason.com/securityalert/3531 - Third Party Advisory
References () http://support.apple.com/kb/HT3216 - Third Party Advisory () http://support.apple.com/kb/HT3216 - Third Party Advisory
References () http://www.debian.org/security/2008/dsa-1478 - Third Party Advisory () http://www.debian.org/security/2008/dsa-1478 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 - Broken Link
References () http://www.securityfocus.com/archive/1/485810/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/485810/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/485811/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/485811/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/27140 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/27140 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/31681 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/31681 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-588-1 - Third Party Advisory () http://www.ubuntu.com/usn/usn-588-1 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2008/0560/references - Permissions Required () http://www.vupen.com/english/advisories/2008/0560/references - Permissions Required
References () http://www.vupen.com/english/advisories/2008/2780 - Permissions Required () http://www.vupen.com/english/advisories/2008/2780 - Permissions Required
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39429 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/39429 - VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39431 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/39431 - VDB Entry

Information

Published : 2008-01-10 23:46

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0226

Mitre link : CVE-2008-0226

CVE.ORG link : CVE-2008-0226


JSON object : View

Products Affected

apple

  • mac_os_x

canonical

  • ubuntu_linux

mysql

  • mysql

oracle

  • mysql

yassl

  • yassl

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer