The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-06-25T04:00:00
Updated: 2019-07-09T16:06:03
Reserved: 2002-03-01T00:00:00
Link: CVE-2002-0082
JSON object: View
NVD Information
Status : Modified
Published: 2002-03-15T05:00:00.000
Modified: 2016-10-18T02:16:00.527
Link: CVE-2002-0082
JSON object: View
Redhat Information
No data.
CWE