Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2002-0082

Опубликовано: 27 фев. 2002
Источник: redhat
EPSS Низкий

Описание

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

Дополнительная информация

Статус:

Important

EPSS

Процентиль: 84%
0.02161
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

github
больше 3 лет назад

The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.

EPSS

Процентиль: 84%
0.02161
Низкий