// For flags

CVE-2002-0082

Apache mod_ssl < 2.8.7 OpenSSL - 'OpenFuckV2.c' Remote Buffer Overflow

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

El código de mod_ssl dbm y shm cache anteriores a 2.8.7-1.3.23 y Apache-SSL anteriores a 1.3.22 1.46 no inicializa adecuadamente la memoria usando la función i2d_SSL_SESSION, lo que permite a atacantes remotos usar un desbordamiento de buffer para ejecutar código arbitrario mediante un certificado de cliente largo firmado por una Autoricad Certificadora (CA) larga, lo que produce una sesión serializada larga.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2002-03-01 CVE Reserved
  • 2002-03-15 CVE Published
  • 2002-07-30 First Exploit
  • 2024-02-08 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (23)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.40
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.40"
-
Affected
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.41
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.41"
-
Affected
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.42
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.42"
-
Affected
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.44
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.44"
-
Affected
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.45
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.45"
-
Affected
Apache-ssl
Search vendor "Apache-ssl"
Apache-ssl
Search vendor "Apache-ssl" for product "Apache-ssl"
1.46
Search vendor "Apache-ssl" for product "Apache-ssl" and version "1.46"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.7.1
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.7.1"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.1
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.1"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.2
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.2"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.3
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.3"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.4
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.4"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.5
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.5"
-
Affected
Mod Ssl
Search vendor "Mod Ssl"
Mod Ssl
Search vendor "Mod Ssl" for product "Mod Ssl"
2.8.6
Search vendor "Mod Ssl" for product "Mod Ssl" and version "2.8.6"
-
Affected