The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2002-06-25T04:00:00

Updated: 2024-08-08T02:35:17.584Z

Reserved: 2002-03-01T00:00:00

Link: CVE-2002-0082

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2002-03-15T05:00:00.000

Modified: 2024-11-20T23:38:15.983

Link: CVE-2002-0082

cve-icon Redhat

Severity : Important

Publid Date: 2002-02-27T00:00:00Z

Links: CVE-2002-0082 - Bugzilla