Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-62p8-jm49-f9f2

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

EPSS

Процентиль: 100%
0.92107
Критический

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 18 лет назад

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

nvd
почти 18 лет назад

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.

debian
почти 18 лет назад

Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL ...

EPSS

Процентиль: 100%
0.92107
Критический

Дефекты

CWE-119