CVE-2008-0227
Debian Linux Security Advisory 1478-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp.
yaSSL 1.7.5 y anteriores, como el utilizado en MySQL y posiblemente otros productos, permite a atacantes remotos provocar una denegación de servicio (caída) mediante un paquete Hello que contiene un valor de tamaño grande, lo cual provoca una sobre-lectura de búfer en la función HASHwithTransform::Update en hash.cpp.
Masaaki Hirose discovered that MySQL could be made to dereference a NULL pointer. An authenticated user could cause a denial of service (application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table. This issue only affects Ubuntu 6.06 and 6.10. Alexander Nozdrin discovered that MySQL did not restore database access privileges when returning from SQL SECURITY INVOKER stored routines. An authenticated user could exploit this to gain privileges. This issue does not affect Ubuntu 7.10. Martin Friebe discovered that MySQL did not properly update the DEFINER value of an altered view. An authenticated user could use CREATE SQL SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges. Luigi Auriemma discovered that yaSSL as included in MySQL did not properly validate its input. A remote attacker could send crafted requests and cause a denial of service or possibly execute arbitrary code. This issue did not affect Ubuntu 6.06 in the default installation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-01-10 CVE Reserved
- 2008-01-10 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://bugs.mysql.com/33814 | X_refsource_confirm | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html | X_refsource_confirm | |
http://secunia.com/advisories/28597 | Third Party Advisory | |
http://secunia.com/advisories/29443 | Third Party Advisory | |
http://secunia.com/advisories/32222 | Third Party Advisory | |
http://securityreason.com/securityalert/3531 | Third Party Advisory | |
http://support.apple.com/kb/HT3216 | X_refsource_confirm |
|
http://www.securityfocus.com/archive/1/485810/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/31681 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0560/references | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/2780 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39433 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/27140 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html | 2018-10-15 | |
http://secunia.com/advisories/28324 | 2018-10-15 | |
http://www.debian.org/security/2008/dsa-1478 | 2018-10-15 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 | 2018-10-15 | |
http://www.ubuntu.com/usn/usn-588-1 | 2018-10-15 |