CVE-2002-0656
Published Aug 12, 2002
Last updated 16 years ago
Overview
- Description
- Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14D983EC-61B0-4FD9-89B5-9878E4CE4405" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC4C5F05-BC0B-478D-9A6F-7C804777BA41" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EDB5A09-BE86-4352-9799-A875649EDB7D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F03FA9C0-24C7-46AC-92EC-7834BC34C79B" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E4742C-A983-4F00-B24F-AB280C0E876D" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A0628DF-3A4C-4078-B615-22260671EABF" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "962FCB86-15AD-4399-8B7D-EC1DEA919C59" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E3AB748-E463-445C-ABAB-4FEDDFD1878B" }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660E4B8D-AABA-4520-BC4D-CF8E76E07C05" }, { "criteria": "cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD38E99A-864A-4E99-B6A5-12AACDA822E3" }, { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC62E1B2-6964-4459-A1EF-A6A087C2960F" }, { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A6F28FD-6EAD-4EDD-B9A1-0B120D0F0919" }, { "criteria": "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC4ED2EB-1E90-4E99-AAD6-5D838800F9B7" }, { "criteria": "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DABDE61F-A7DD-40A4-9569-8525A63BAA56" }, { "criteria": "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFAA0056-56FF-4D0F-8B44-066A4BFED1B3" }, { "criteria": "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C3C821C-C479-4AAC-84EA-63C798CAB00A" }, { "criteria": "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCAF6167-65C1-4ACB-A75A-53922B64D281" }, { "criteria": "cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B72A661-9EAA-4B9B-8865-17C8A29871BB" }, { "criteria": "cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7485BFF1-6863-4165-BE36-D656F39CF5EF" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99C273D1-ADFE-4B4C-B543-7B9CA741A117" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066ABC3B-B395-42D2-95C0-5B810F91A6F0" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01BC19FC-6E03-4000-AE4B-232E47FA76F2" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "421FC2DD-0CF7-44A2-A63C-5221689E2363" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8B70BC-42B7-453A-B506-7BE69D49A4B5" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA32F7D8-02F8-4CFE-B193-2888807BC4D6" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6" } ], "operator": "OR" } ] } ]