CVE-2002-0657

Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos enabled, allows attackers to execute arbitrary code via a long master key.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt -
References () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt - () ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt -
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc - () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513 -
References () http://www.cert.org/advisories/CA-2002-23.html - Patch, Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2002-23.html - Patch, Third Party Advisory, US Government Resource
References () http://www.iss.net/security_center/static/9715.php - () http://www.iss.net/security_center/static/9715.php -
References () http://www.kb.cert.org/vuls/id/561275 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/561275 - Third Party Advisory, US Government Resource
References () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php - () http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php -
References () http://www.securityfocus.com/bid/5361 - () http://www.securityfocus.com/bid/5361 -

Information

Published : 2002-08-12 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0657

Mitre link : CVE-2002-0657

CVE.ORG link : CVE-2002-0657


JSON object : View

Products Affected

openssl

  • openssl