FKIE_CVE-2002-0082

Vulnerability from fkie_nvd - Published: 2002-03-15 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000465
cve@mitre.orghttp://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml
cve@mitre.orghttp://marc.info/?l=bugtraq&m=101518491916936&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=101528358424306&w=2
cve@mitre.orghttp://online.securityfocus.com/archive/1/258646
cve@mitre.orghttp://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html
cve@mitre.orghttp://www.apacheweek.com/issues/02-03-01#security
cve@mitre.orghttp://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt
cve@mitre.orghttp://www.debian.org/security/2002/dsa-120
cve@mitre.orghttp://www.iss.net/security_center/static/8308.phpPatch, Vendor Advisory
cve@mitre.orghttp://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php
cve@mitre.orghttp://www.linuxsecurity.com/advisories/other_advisory-1923.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-041.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-042.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2002-045.html
cve@mitre.orghttp://www.securityfocus.com/advisories/3965
cve@mitre.orghttp://www.securityfocus.com/advisories/4008
cve@mitre.orghttp://www.securityfocus.com/bid/4189
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000465
af854a3a-2127-422b-91ae-364da2661108http://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=101518491916936&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=101528358424306&w=2
af854a3a-2127-422b-91ae-364da2661108http://online.securityfocus.com/archive/1/258646
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html
af854a3a-2127-422b-91ae-364da2661108http://www.apacheweek.com/issues/02-03-01#security
af854a3a-2127-422b-91ae-364da2661108http://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2002/dsa-120
af854a3a-2127-422b-91ae-364da2661108http://www.iss.net/security_center/static/8308.phpPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php
af854a3a-2127-422b-91ae-364da2661108http://www.linuxsecurity.com/advisories/other_advisory-1923.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-041.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-042.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2002-045.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/3965
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/4008
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/4189

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF77CC7-14EE-44E6-ADD8-17DEFD336BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "075C7AD9-B254-4CAD-8E71-D0DB542D90E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD50710F-6471-4CB7-9047-BC0285F92A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF68B78-F29E-4A4F-9F7B-E408F606C14D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3154AB7-23F9-4D0D-935A-D530DC1F110C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache-ssl:apache-ssl:1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "2716A670-2751-4348-8F56-0F2427D660CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB888875-1AFC-4569-B783-CDE92B717882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E1E3411-A16E-4B11-983D-C83644B471CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39E94EF-FEF4-41CA-BCD5-F3273D40D0F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A7DE9F-3088-445E-A09A-FC8E155C4E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3906A1FB-3105-4248-B9D2-B915AEF90E9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DB98C0-A15B-4186-8DAC-D906ABBEC2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B615EC-D5AF-4C62-AF0A-453F7FD11DAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50211658-1959-4E97-9FF5-6ABAF3B98C36",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session."
    },
    {
      "lang": "es",
      "value": "El c\u00f3digo de mod_ssl dbm y shm cache anteriores a 2.8.7-1.3.23 y Apache-SSL anteriores a 1.3.22 1.46 no inicializa adecuadamente la memoria usando la funci\u00f3n i2d_SSL_SESSION, lo que permite a atacantes remotos usar un desbordamiento de buffer para ejecutar c\u00f3digo arbitrario mediante un certificado de cliente largo firmado por una Autoricad Certificadora (CA) larga, lo que produce una sesi\u00f3n serializada larga."
    }
  ],
  "id": "CVE-2002-0082",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-03-15T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000465"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101518491916936\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101528358424306\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/archive/1/258646"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.apacheweek.com/issues/02-03-01#security"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2002/dsa-120"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8308.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linuxsecurity.com/advisories/other_advisory-1923.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-041.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-042.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-045.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/3965"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/4008"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/4189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101518491916936\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101528358424306\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/archive/1/258646"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.apacheweek.com/issues/02-03-01#security"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2002/dsa-120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8308.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linuxsecurity.com/advisories/other_advisory-1923.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/3965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/4008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/4189"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…