Vulnerability Name:

CVE-2008-0227 (CCN-39433)

Assigned:2008-01-04
Published:2008-01-04
Updated:2018-10-15
Summary:yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Luigi Auriemma Advisories, 04 Jan 2008
Multiple vulnerabilities in yaSSL 1.7.5

Source: CONFIRM
Type: UNKNOWN
http://bugs.mysql.com/33814

Source: MITRE
Type: CNA
CVE-2008-0227

Source: CONFIRM
Type: UNKNOWN
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-10-09

Source: CCN
Type: SA28324
yaSSL Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
28324

Source: SECUNIA
Type: UNKNOWN
28597

Source: SECUNIA
Type: UNKNOWN
29443

Source: CCN
Type: SA32222
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
32222

Source: SREASON
Type: UNKNOWN
3531

Source: CCN
Type: Apple Web site
About Security Update 2008-007

Source: CONFIRM
Type: UNKNOWN
http://support.apple.com/kb/HT3216

Source: DEBIAN
Type: UNKNOWN
DSA-1478

Source: DEBIAN
Type: DSA-1478
mysql-dfsg-5.0 -- buffer overflows

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:150

Source: CCN
Type: OSVDB ID: 41197
yaSSL hash.cpp HASHwithTransform::Update Function Hello Packet Overflow DoS

Source: BUGTRAQ
Type: UNKNOWN
20080104 Multiple vulnerabilities in yaSSL 1.7.5

Source: BID
Type: Exploit
27140

Source: CCN
Type: BID-27140
yaSSL Multiple Remote Buffer Overflow Vulnerabilities

Source: BID
Type: UNKNOWN
31681

Source: CCN
Type: BID-31681
RETIRED: Apple Mac OS X 2008-007 Multiple Security Vulnerabilities

Source: CCN
Type: USN-588-1
MySQL vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-588-1

Source: CCN
Type: USN-588-2
MySQL regression

Source: VUPEN
Type: UNKNOWN
ADV-2008-0560

Source: VUPEN
Type: UNKNOWN
ADV-2008-2780

Source: CCN
Type: yaSSL Web site
yaSSL

Source: XF
Type: UNKNOWN
yassl-hashwithtransformupdate-dos(39433)

Source: XF
Type: UNKNOWN
yassl-hashwithtransformupdate-dos(39433)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:yassl:yassl:*:*:*:*:*:*:*:* (Version <= 1.7.5)

  • Configuration CCN 1:
  • cpe:/a:yassl:yassl:1.7.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:canonical:ubuntu:6.06:*:lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:17775
    P
    USN-588-1 -- mysql-dfsg-5.0 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17802
    P
    USN-588-2 -- mysql-dfsg-5.0 regression
    2014-06-30
    oval:org.mitre.oval:def:19935
    P
    DSA-1478-1 mysql-dfsg-5.0 - buffer overflows
    2014-06-23
    oval:org.mitre.oval:def:8173
    P
    DSA-1478 mysql-dfsg-5.0 -- buffer overflows
    2014-06-23
    oval:org.debian:def:1478
    V
    buffer overflows
    2008-01-28
    BACK
    yassl yassl *
    yassl yassl 1.7.5
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    apple mac os x server 10.5
    apple mac os x server 10.5.1
    apple mac os x server 10.5.2
    apple mac os x server 10.5.3
    apple mac os x server 10.5.4
    apple mac os x server 10.5.5