Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-d4r8-e34r-pfge |
| Summary | Multiple vulnerabilities were found in MySQL, some of which may
allow execution of arbitrary code. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4484 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.989 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98901 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98903 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98904 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98908 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98909 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98911 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98915 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.98919 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.75816 |
| scoring_system |
epss |
| scoring_elements |
0.9892 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-4484 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
228 |
| name |
Improper Handling of Syntactically Invalid Structure |
| description |
The product does not handle or incorrectly handles input that is not syntactically well-formed with respect to the associated specification. |
|
| 1 |
| cwe_id |
119 |
| name |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
| description |
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. |
|
|
| Exploits |
| 0 |
| date_added |
2010-04-30 |
| description |
MySQL - yaSSL CertDecoder::GetName Buffer Overflow (Metasploit) |
| required_action |
null |
| due_date |
null |
| notes |
null |
| known_ransomware_campaign_use |
true |
| source_date_published |
2010-04-30 |
| exploit_type |
remote |
| platform |
linux |
| source_date_updated |
2011-03-06 |
| data_source |
Exploit-DB |
| source_url |
http://secunia.com/advisories/38344/ |
|
| 1 |
| date_added |
null |
| description |
This module exploits a stack buffer overflow in the yaSSL (1.9.8 and earlier)
implementation bundled with MySQL. By sending a specially crafted
client certificate, an attacker can execute arbitrary code.
This vulnerability is present within the CertDecoder::GetName function inside
"taocrypt/src/asn.cpp". However, the stack buffer that is written to exists
within a parent function's stack frame.
NOTE: This vulnerability requires a non-default configuration. First, the attacker
must be able to pass the host-based authentication. Next, the server must be
configured to listen on an accessible network interface. Lastly, the server
must have been manually configured to use SSL.
The binary from version 5.5.0-m2 was built with /GS and /SafeSEH. During testing
on Windows XP SP3, these protections successfully prevented exploitation.
Testing was also done with mysql on Ubuntu 9.04. Although the vulnerable code is
present, both version 5.5.0-m2 built from source and version 5.0.75 from a binary
package were not exploitable due to the use of the compiler's FORTIFY feature.
Although suse11 was mentioned in the original blog post, the binary package they
provide does not contain yaSSL or support SSL. |
| required_action |
null |
| due_date |
null |
| notes |
Reliability:
- unknown-reliability
Stability:
- unknown-stability
SideEffects:
- unknown-side-effects
|
| known_ransomware_campaign_use |
false |
| source_date_published |
2010-01-25 |
| exploit_type |
null |
| platform |
Linux |
| source_date_updated |
null |
| data_source |
Metasploit |
| source_url |
https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/mysql/mysql_yassl_getname.rb |
|
|
| Severity_range_score | null |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-d4r8-e34r-pfge |