Search for vulnerabilities
Vulnerability ID | VCID-42ew-ga1t-aaaq |
Aliases |
CVE-2002-0656
VC-OPENSSL-20020730-CVE-2002-0656 |
Summary | A buffer overflow allowed remote attackers to execute arbitrary code by sending a large client master key in SSL2 or a large session ID in SSL3. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | Sept. 8, 2016 |
Description | Apache mod_ssl OpenSSL < 0.9.6d / < 0.9.7-beta2 - 'openssl-too-open.c' SSL2 KEY_ARG Overflow |
Ransomware campaign use | Unknown |
Source publication date | Sept. 17, 2002 |
Exploit type | remote |
Platform | unix |
Source update date | Sept. 8, 2016 |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.98294 |
EPSS Score | 0.73017 |
Published At | Dec. 17, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |