Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://www.iss.net/security_center/static/8308.php", "name": "apache-modssl-bo(8308)", "tags": ["Patch", "Vendor Advisory"], "refsource": "XF"}, {"url": "http://www.apacheweek.com/issues/02-03-01#security", "name": "http://www.apacheweek.com/issues/02-03-01#security", "tags": [], "refsource": "CONFIRM"}, {"url": "http://online.securityfocus.com/archive/1/258646", "name": "20020227 mod_ssl Buffer Overflow Condition (Update Available)", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://www.linuxsecurity.com/advisories/other_advisory-1923.html", "name": "ESA-20020301-005", "tags": [], "refsource": "ENGARDE"}, {"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000465", "name": "CLA-2002:465", "tags": [], "refsource": "CONECTIVA"}, {"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php", "name": "MDKSA-2002:020", "tags": [], "refsource": "MANDRAKE"}, {"url": "http://www.redhat.com/support/errata/RHSA-2002-041.html", "name": "RHSA-2002:041", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.redhat.com/support/errata/RHSA-2002-042.html", "name": "RHSA-2002:042", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.redhat.com/support/errata/RHSA-2002-045.html", "name": "RHSA-2002:045", "tags": [], "refsource": "REDHAT"}, {"url": "http://www.debian.org/security/2002/dsa-120", "name": "DSA-120", "tags": [], "refsource": "DEBIAN"}, {"url": "http://www.securityfocus.com/advisories/3965", "name": "HPSBTL0203-031", "tags": [], "refsource": "HP"}, {"url": "http://www.securityfocus.com/advisories/4008", "name": "HPSBUX0204-190", "tags": [], "refsource": "HP"}, {"url": "http://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt", "name": "CSSA-2002-011.0", "tags": [], "refsource": "CALDERA"}, {"url": "http://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml", "name": "SSRT0817", "tags": [], "refsource": "COMPAQ"}, {"url": "http://www.securityfocus.com/bid/4189", "name": "4189", "tags": [], "refsource": "BID"}, {"url": "http://marc.info/?l=bugtraq&m=101518491916936&w=2", "name": "20020301 Apache-SSL buffer overflow (fix available)", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://marc.info/?l=bugtraq&m=101528358424306&w=2", "name": "20020304 Apache-SSL 1.3.22+1.47 - update to security fix", "tags": [], "refsource": "BUGTRAQ"}, {"url": "http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html", "name": "http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html", "tags": [], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2002-0082", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "HIGH", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}}, "publishedDate": "2002-03-15T05:00Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:apache-ssl:apache-ssl:1.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:mod_ssl:mod_ssl:2.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2016-10-18T02:16Z"}