The dbm and shm session cache code in mod_ssl prior to 2.8.7-1.3.23, and Apache-SSL prior to 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote malicious users to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache-ssl apache-ssl 1.45 |
||
apache-ssl apache-ssl 1.46 |
||
mod ssl mod ssl 2.8.5 |
||
mod ssl mod ssl 2.8.6 |
||
apache-ssl apache-ssl 1.42 |
||
apache-ssl apache-ssl 1.44 |
||
mod ssl mod ssl 2.8.3 |
||
mod ssl mod ssl 2.8.4 |
||
mod ssl mod ssl 2.7.1 |
||
mod ssl mod ssl 2.8 |
||
apache-ssl apache-ssl 1.40 |
||
apache-ssl apache-ssl 1.41 |
||
mod ssl mod ssl 2.8.1 |
||
mod ssl mod ssl 2.8.2 |