Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53577
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 120-1 (libapache-mod-ssl, apache-ssl)
Summary:The remote host is missing an update to libapache-mod-ssl, apache-ssl;announced via advisory DSA 120-1.
Description:Summary:
The remote host is missing an update to libapache-mod-ssl, apache-ssl
announced via advisory DSA 120-1.

Vulnerability Insight:
Ed Moyle recently found a buffer overflow in Apache-SSL and mod_ssl.
With session caching enabled, mod_ssl will serialize SSL session
variables to store them for later use. These variables were stored in
a buffer of a fixed size without proper boundary checks.

To exploit the overflow, the server must be configured to require client
certificates, and an attacker must obtain a carefully crafted client
certificate that has been signed by a Certificate Authority which is
trusted by the server. If these conditions are met, it would be possible
for an attacker to execute arbitrary code on the server.

This problem has been fixed in version 1.3.9.13-4 of Apache-SSL and
version 2.4.10-1.3.9-1potato1 of libapache-mod-ssl for the stable
Debian distribution as well as in version 1.3.23.1+1.47-1 of
Apache-SSL and version 2.8.7-1 of libapache-mod-ssl for the testing
and unstable distribution of Debian.

Solution:
We recommend that you upgrade your Apache-SSL and mod_ssl packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2002-0082
BugTraq ID: 4189
http://www.securityfocus.com/bid/4189
Bugtraq: 20020227 mod_ssl Buffer Overflow Condition (Update Available) (Google Search)
http://online.securityfocus.com/archive/1/258646
Bugtraq: 20020228 TSLSA-2002-0034 - apache (Google Search)
Bugtraq: 20020301 Apache-SSL buffer overflow (fix available) (Google Search)
http://marc.info/?l=bugtraq&m=101518491916936&w=2
Bugtraq: 20020304 Apache-SSL 1.3.22+1.47 - update to security fix (Google Search)
http://marc.info/?l=bugtraq&m=101528358424306&w=2
Caldera Security Advisory: CSSA-2002-011.0
http://www.calderasystems.com/support/security/advisories/CSSA-2002-011.0.txt
COMPAQ Service Security Patch: SSRT0817
http://ftp.support.compaq.com/patches/.new/html/SSRT0817.shtml
Conectiva Linux advisory: CLA-2002:465
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000465
Debian Security Information: DSA-120 (Google Search)
http://www.debian.org/security/2002/dsa-120
En Garde Linux Advisory: ESA-20020301-005
http://www.linuxsecurity.com/advisories/other_advisory-1923.html
HPdes Security Advisory: HPSBTL0203-031
http://www.securityfocus.com/advisories/3965
HPdes Security Advisory: HPSBUX0204-190
http://www.securityfocus.com/advisories/4008
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-020.php
http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html
http://www.redhat.com/support/errata/RHSA-2002-041.html
http://www.redhat.com/support/errata/RHSA-2002-042.html
http://www.redhat.com/support/errata/RHSA-2002-045.html
http://www.iss.net/security_center/static/8308.php
CopyrightCopyright (C) 2008 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.