The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2002-03-14 21:00
Updated : 2016-10-17 19:16
NVD link : CVE-2002-0082
Mitre link : CVE-2002-0082
JSON object : View
CWE
Products Affected
apache-ssl
- apache-ssl
mod_ssl
- mod_ssl