Language:
http://www.nessus.org/u?409fbf00
http://www.nessus.org/u?d46c3ad9
https://bugs.mysql.com/bug.php?id=50227
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-43.html
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-90.html
http://www.nessus.org/u?d50b4e7b
Severity: High
ID: 17835
File Name: mysql_5_1_43_yaSSL.nasl
Version: 1.5
Type: remote
Family: Databases
Published: 1/18/2012
Updated: 11/15/2018
Configuration: Enable paranoid mode
Supported Sensors: Frictionless Assessment Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE: cpe:/a:mysql:mysql
Required KB Items: Settings/ParanoidReport
Exploit Available: true
Exploit Ease: Exploits are available
Vulnerability Publication Date: 1/26/2010
Core Impact
Metasploit (MySQL yaSSL CertDecoder::GetName Buffer Overflow)
CVE: CVE-2009-4484
CWE: 119