Vulnerability Details : CVE-2002-0657
Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos enabled, allows attackers to execute arbitrary code via a long master key.
Vulnerability category: OverflowExecute code
Products affected by CVE-2002-0657
- cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-0657
2.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0657
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0657
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt
-
http://www.securityfocus.com/bid/5361
-
http://www.kb.cert.org/vuls/id/561275
VU#561275 - OpenSSL servers contain a remotely exploitable buffer overflow vulnerability during the SSL3 handshake processThird Party Advisory;US Government Resource
-
http://www.iss.net/security_center/static/9715.php
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt
-
http://www.cert.org/advisories/CA-2002-23.html
2002 CERT AdvisoriesPatch;Third Party Advisory;US Government Resource
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php
Jump to