First published: Thu Jan 10 2008(Updated: )
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
yaSSL | <=1.7.5 | |
MySQL | =5.0.5 | |
MySQL | =5.0.10 | |
MySQL | =5.0.54 | |
MySQL | =5.0.0 | |
MySQL | =5.0.15 | |
MySQL | =5.0.17 | |
MySQL | =5.0.3 | |
MySQL | =5.0.44 | |
MySQL | =5.0.66 | |
MySQL | =5.0.56 | |
MySQL | =5.0.60 | |
MySQL | =5.0.24 | |
MySQL | =5.0.2 | |
MySQL | =5.0.30 | |
MySQL | =5.0.20 | |
MySQL | =5.0.1 | |
MySQL | =5.0.4 | |
MySQL | =5.0.36 | |
MySQL | =5.0.16 | |
MySQL | =5.1.5 | |
MySQL | =5.0.48 | |
MySQL | =5.0.50-sp1 | |
MySQL | =5.0.50 | |
MySQL | =5.0.51 | |
MySQL | =5.0.23 | |
MySQL | =5.0.25 | |
MySQL | =5.0.26 | |
MySQL | =5.0.28 | |
MySQL | =5.0.30-sp1 | |
MySQL | =5.0.32 | |
MySQL | =5.0.34 | |
MySQL | =5.0.36-sp1 | |
MySQL | =5.0.38 | |
MySQL | =5.0.40 | |
MySQL | =5.0.41 | |
MySQL | =5.0.42 | |
MySQL | =5.0.44-sp1 | |
MySQL | =5.0.45 | |
MySQL | =5.0.46 | |
MySQL | =5.0.52 | |
MySQL | =5.0.56-sp1 | |
MySQL | =5.0.58 | |
MySQL | =5.0.62 | |
MySQL | =5.0.64 | |
MySQL | =5.1 | |
MySQL | =5.1.1 | |
MySQL | =5.1.2 | |
MySQL | =5.1.3 | |
MySQL | =5.1.4 | |
MySQL | =5.1.6 | |
MySQL | =5.1.7 | |
MySQL | =5.1.8 | |
MySQL | =5.1.9 | |
MySQL | =5.1.10 | |
MySQL | =5.1.11 | |
MySQL | =5.1.12 | |
MySQL | =5.1.13 | |
MySQL | =5.1.14 | |
MySQL | =5.1.15 | |
MySQL | =5.1.16 | |
MySQL | =5.1.17 | |
MySQL | =5.1.18 | |
MySQL | =5.1.19 | |
MySQL | =5.1.20 | |
MySQL | =5.1.21 | |
MySQL | =5.1.22 | |
MySQL | =5.0.60-sp1 | |
MySQL | =5.0.66-sp1 | |
Apple iOS and macOS | =10.5.4 | |
Debian Linux | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =7.04 | |
Ubuntu | =7.10 | |
Ubuntu | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0226 is considered a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2008-0226, upgrade yaSSL to version 1.7.6 or later, and ensure your MySQL server is updated to a patched version.
CVE-2008-0226 affects yaSSL versions 1.7.5 and earlier, and various versions of MySQL such as 5.0.5 and up to 5.1.22.
Yes, CVE-2008-0226 can be exploited remotely, which poses significant risk if the systems are publicly accessible.
CVE-2008-0226 can lead to buffer overflow attacks, potentially allowing attackers to execute arbitrary code on the affected system.