First published: Thu Jul 11 2002(Updated: )
Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Mod SSL | <=2.8.9 | |
CentOS Mod SSL | <=2.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0653 has a high severity due to its potential to allow local users to execute arbitrary code as the Apache server user.
To fix CVE-2002-0653, you should upgrade to mod_ssl version 2.8.10 or later, which addresses this vulnerability.
All local users with access to .htaccess files in environments using mod_ssl version 2.8.9 and earlier are affected by CVE-2002-0653.
CVE-2002-0653 exploits an off-by-one buffer overflow through the ssl_compat_directive function in mod_ssl.
CVE-2002-0653 is primarily a local vulnerability, requiring local user access to exploit, rather than being remotely exploitable.