7.5
CVSSv2

CVE-2002-0655

Published: 12/08/2002 Updated: 10/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow malicious users to cause a denial of service and possibly execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.1c

openssl openssl 0.9.5a

openssl openssl 0.9.6a

oracle application server 1.0.2

openssl openssl 0.9.6c

openssl openssl 0.9.6d

openssl openssl 0.9.7

openssl openssl 0.9.2b

openssl openssl 0.9.3

openssl openssl 0.9.4

openssl openssl 0.9.5

oracle corporate time outlook connector 3.1.1

oracle corporate time outlook connector 3.1.2

oracle corporate time outlook connector 3.3

oracle http server 9.0.1

oracle application server 1.0.2.2

openssl openssl 0.9.6

openssl openssl 0.9.6b

oracle application server

oracle application server 1.0.2.1s

oracle corporate time outlook connector 3.1

oracle http server 9.2.0

apple mac os x 10.0.2

apple mac os x 10.0.3

apple mac os x 10.0.4

apple mac os x 10.1

apple mac os x 10.1.5

apple mac os x 10.0.1

apple mac os x 10.1.1

apple mac os x 10.1.3

apple mac os x 10.0

apple mac os x 10.1.2

apple mac os x 10.1.4

Vendor Advisories

The OpenSSL development team has announced that a security audit by AL Digital Ltd and The Bunker, under the DARPA CHATS program, has revealed remotely exploitable buffer overflow conditions in the OpenSSL code Additionally, the ASN1 parser in OpenSSL has a potential DoS attack independently discovered by Adi Stav and James Yonan CAN-2002-0655 ...