The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
2002-03-15T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | apache-ssl | apache-ssl | 1.40 | Yes |
| Application | apache-ssl | apache-ssl | 1.41 | Yes |
| Application | apache-ssl | apache-ssl | 1.42 | Yes |
| Application | apache-ssl | apache-ssl | 1.44 | Yes |
| Application | apache-ssl | apache-ssl | 1.45 | Yes |
| Application | apache-ssl | apache-ssl | 1.46 | Yes |
| Application | mod_ssl | mod_ssl | 2.7.1 | Yes |
| Application | mod_ssl | mod_ssl | 2.8 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.1 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.2 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.3 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.4 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.5 | Yes |
| Application | mod_ssl | mod_ssl | 2.8.6 | Yes |