Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos enabled, allows attackers to execute arbitrary code via a long master key.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt - | |
References | () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt - | |
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc - | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513 - | |
References | () http://www.cert.org/advisories/CA-2002-23.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.iss.net/security_center/static/9715.php - | |
References | () http://www.kb.cert.org/vuls/id/561275 - Third Party Advisory, US Government Resource | |
References | () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php - | |
References | () http://www.securityfocus.com/bid/5361 - |
Information
Published : 2002-08-12 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0657
Mitre link : CVE-2002-0657
CVE.ORG link : CVE-2002-0657
JSON object : View
Products Affected
openssl
- openssl
CWE