CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
98.3%
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
Vendor | Product | Version | CPE |
---|---|---|---|
openssl | openssl | 0.9.1c | cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* |
openssl | openssl | 0.9.2b | cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* |
openssl | openssl | 0.9.3 | cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* |
openssl | openssl | 0.9.4 | cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* |
openssl | openssl | 0.9.5 | cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* |
openssl | openssl | 0.9.5a | cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6 | cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6a | cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6b | cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* |
openssl | openssl | 0.9.6c | cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513
www.cert.org/advisories/CA-2002-23.html
www.iss.net/security_center/static/9714.php
www.iss.net/security_center/static/9716.php
www.kb.cert.org/vuls/id/102795
www.kb.cert.org/vuls/id/258555
www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php
www.securityfocus.com/bid/5362
www.securityfocus.com/bid/5363