Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) “input_buffer& operator>>” in yassl_imp.cpp.
bugs.mysql.com/33814
dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html
lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
secunia.com/advisories/28324
secunia.com/advisories/28419
secunia.com/advisories/28597
secunia.com/advisories/29443
secunia.com/advisories/32222
securityreason.com/securityalert/3531
support.apple.com/kb/HT3216
www.debian.org/security/2008/dsa-1478
www.mandriva.com/security/advisories?name=MDVSA-2008:150
www.securityfocus.com/archive/1/485810/100/0/threaded
www.securityfocus.com/archive/1/485811/100/0/threaded
www.securityfocus.com/bid/27140
www.securityfocus.com/bid/31681
www.ubuntu.com/usn/usn-588-1
www.vupen.com/english/advisories/2008/0560/references
www.vupen.com/english/advisories/2008/2780
exchange.xforce.ibmcloud.com/vulnerabilities/39429
exchange.xforce.ibmcloud.com/vulnerabilities/39431