Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2002-0656
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.2:*:*: |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:corporate_time_outlook_connector:3.3:*:*:*: |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.1:*:*: |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.cert.org/advisories/CA-2002-23.html
- http://www.kb.cert.org/vuls/id/102795
- http://www.kb.cert.org/vuls/id/258555
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc
- http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php
- http://www.iss.net/security_center/static/9714.php
- http://www.securityfocus.com/bid/5362
- http://www.securityfocus.com/bid/5363
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513
- http://www.iss.net/security_center/static/9716.php