7.5
CVSSv2

CVE-2002-0656

Published: 12/08/2002 Updated: 10/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflows in OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, allow remote malicious users to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.6a

openssl openssl 0.9.6b

openssl openssl 0.9.6c

openssl openssl 0.9.6d

openssl openssl 0.9.1c

openssl openssl 0.9.2b

openssl openssl 0.9.3

oracle application server 1.0.2.1s

oracle application server 1.0.2.2

oracle corporate time outlook connector 3.1

oracle corporate time outlook connector 3.1.1

openssl openssl 0.9.4

openssl openssl 0.9.5a

openssl openssl 0.9.7

oracle application server 1.0.2

oracle corporate time outlook connector 3.1.2

oracle http server 9.0.1

openssl openssl 0.9.5

openssl openssl 0.9.6

oracle application server

oracle corporate time outlook connector 3.3

oracle http server 9.2.0

apple mac os x 10.0

apple mac os x 10.0.1

apple mac os x 10.0.2

apple mac os x 10.0.3

apple mac os x 10.1.3

apple mac os x 10.1.4

apple mac os x 10.1.5

apple mac os x 10.0.4

apple mac os x 10.1.1

apple mac os x 10.1

apple mac os x 10.1.2

Vendor Advisories

The OpenSSL development team has announced that a security audit by AL Digital Ltd and The Bunker, under the DARPA CHATS program, has revealed remotely exploitable buffer overflow conditions in the OpenSSL code Additionally, the ASN1 parser in OpenSSL has a potential DoS attack independently discovered by Adi Stav and James Yonan CAN-2002-0655 ...

Exploits

/* * openssl-too-openc - OpenSSL remote exploit * Spawns a nobody/apache shell on Apache, root on other servers * * by Solar Eclipse <solareclipse@phreedomorg> * * Thanks to Core, HD Moore, Zillion, Dvorak and Black Berry for their help * * This code or any derivative versions of it may not be posted to Bugtraq * or anywhere on S ...