First published: Wed Jul 31 2002(Updated: )
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL | =0.9.1c | |
OpenSSL | =0.9.2b | |
OpenSSL | =0.9.3 | |
OpenSSL | =0.9.4 | |
OpenSSL | =0.9.5 | |
OpenSSL | =0.9.5a | |
OpenSSL | =0.9.6 | |
OpenSSL | =0.9.6a | |
OpenSSL | =0.9.6b | |
OpenSSL | =0.9.6c | |
OpenSSL | =0.9.6d | |
OpenSSL | =0.9.7-beta1 | |
OpenSSL | =0.9.7-beta2 | |
Oracle Java System Application Server | ||
Oracle Java System Application Server | =1.0.2 | |
Oracle Java System Application Server | =1.0.2.1s | |
Oracle Java System Application Server | =1.0.2.2 | |
oracle corporate time outlook connector | =3.1 | |
oracle corporate time outlook connector | =3.1.1 | |
oracle corporate time outlook connector | =3.1.2 | |
oracle corporate time outlook connector | =3.3 | |
Oracle HTTP Server | =9.0.1 | |
Oracle HTTP Server | =9.2.0 | |
Apple iOS and macOS | =10.0 | |
Apple iOS and macOS | =10.0.1 | |
Apple iOS and macOS | =10.0.2 | |
Apple iOS and macOS | =10.0.3 | |
Apple iOS and macOS | =10.0.4 | |
Apple iOS and macOS | =10.1 | |
Apple iOS and macOS | =10.1.1 | |
Apple iOS and macOS | =10.1.2 | |
Apple iOS and macOS | =10.1.3 | |
Apple iOS and macOS | =10.1.4 | |
Apple iOS and macOS | =10.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0656 is considered to have a high severity due to potential remote code execution vulnerabilities.
To fix CVE-2002-0656, upgrade OpenSSL to version 0.9.7 or later, which contains patches for this vulnerability.
CVE-2002-0656 affects OpenSSL versions 0.9.6d and earlier, and 0.9.7-beta2 and earlier.
CVE-2002-0656 allows remote attackers to execute arbitrary code through buffer overflows via a large client master key or session ID.
Yes, CVE-2002-0656 is exploitable over the Internet, making affected systems vulnerable to remote attacks.