Search for vulnerabilities
Vulnerability details: VCID-y5rb-98xd-aaas
Vulnerability ID VCID-y5rb-98xd-aaas
Aliases CVE-2002-1568
VC-OPENSSL-20020808-CVE-2002-1568
Summary The use of assertions when detecting buffer overflow attacks allowed remote attackers to cause a denial of service (crash) by sending certain messages to cause OpenSSL to abort from a failed assertion, as demonstrated using SSLv2 CLIENT_MASTER_KEY messages, which were not properly handled in s2_srvr.c.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00803 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.00998 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.01095 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
epss 0.02277 https://api.first.org/data/v1/epss?cve=CVE-2002-1568
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1616924
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2002-1568
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2002-1568
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.81471
EPSS Score 0.00803
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.