CVE Vulnerabilities

CVE-2002-0082

Published: Mar 15, 2002 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

Affected Software

NameVendorStart VersionEnd Version
Apache-sslApache-ssl1.40 (including)1.40 (including)
Apache-sslApache-ssl1.41 (including)1.41 (including)
Apache-sslApache-ssl1.42 (including)1.42 (including)
Apache-sslApache-ssl1.44 (including)1.44 (including)
Apache-sslApache-ssl1.45 (including)1.45 (including)
Apache-sslApache-ssl1.46 (including)1.46 (including)
Mod_sslMod_ssl2.7.1 (including)2.7.1 (including)
Mod_sslMod_ssl2.8 (including)2.8 (including)
Mod_sslMod_ssl2.8.1 (including)2.8.1 (including)
Mod_sslMod_ssl2.8.2 (including)2.8.2 (including)
Mod_sslMod_ssl2.8.3 (including)2.8.3 (including)
Mod_sslMod_ssl2.8.4 (including)2.8.4 (including)
Mod_sslMod_ssl2.8.5 (including)2.8.5 (including)
Mod_sslMod_ssl2.8.6 (including)2.8.6 (including)
Red Hat Linux 7.0RedHat*
Red Hat Linux 7.1RedHat*
Red Hat Linux 7.2RedHat*
Red Hat Secure Web Server 3.2RedHat*
Red Hat Stronghold 3RedHat*

References