Vulnerability Details : CVE-2002-0656
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
Vulnerability category: Execute code
Products affected by CVE-2002-0656
- cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:corporate_time_outlook_connector:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-0656
74.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0656
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0656
-
http://www.iss.net/security_center/static/9714.php
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.kb.cert.org/vuls/id/102795
VU#102795 - OpenSSL servers contain a buffer overflow during the SSL2 handshake processUS Government Resource
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt
-
http://www.securityfocus.com/bid/5363
-
http://www.kb.cert.org/vuls/id/258555
VU#258555 - OpenSSL clients contain a buffer overflow during the SSL3 handshake processUS Government Resource
-
http://www.iss.net/security_center/static/9716.php
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt
-
http://www.cert.org/advisories/CA-2002-23.html
2002 CERT AdvisoriesUS Government Resource
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php
-
http://www.securityfocus.com/bid/5362
Jump to