Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2002-0082

Опубликовано: 27 фев. 2002
Источник: redhat
EPSS Низкий

Описание

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

Дополнительная информация

Статус:

Important

EPSS

Процентиль: 86%
0.02868
Низкий

Связанные уязвимости

nvd
около 24 лет назад

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

github
почти 4 года назад

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

EPSS

Процентиль: 86%
0.02868
Низкий