First published: Fri Mar 15 2002(Updated: )
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache SSL | =1.40 | |
Apache SSL | =1.41 | |
Apache SSL | =1.42 | |
Apache SSL | =1.44 | |
Apache SSL | =1.45 | |
Apache SSL | =1.46 | |
CentOS Mod SSL | =2.7.1 | |
CentOS Mod SSL | =2.8 | |
CentOS Mod SSL | =2.8.1 | |
CentOS Mod SSL | =2.8.2 | |
CentOS Mod SSL | =2.8.3 | |
CentOS Mod SSL | =2.8.4 | |
CentOS Mod SSL | =2.8.5 | |
CentOS Mod SSL | =2.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0082 is considered to have a critical severity due to its potential to allow remote execution of arbitrary code.
To fix CVE-2002-0082, upgrade to a patched version of mod_ssl after 2.8.7 or Apache-SSL after 1.3.22+1.46.
CVE-2002-0082 affects multiple versions of mod_ssl and Apache-SSL, specifically versions before 2.8.7-1.3.23 for mod_ssl and 1.3.22+1.46 for Apache-SSL.
CVE-2002-0082 can be exploited through a buffer overflow attack using a large client certificate that is signed.
While CVE-2002-0082 was reported over two decades ago, it remains relevant for maintaining secure configurations on legacy systems that still use the vulnerable software.