Apache mod_ssl i2d_SSL_SESSION Function SSL Client Certificate Overflow

high Nessus Plugin ID 10888

Synopsis

The remote web server module has a buffer overflow vulnerability.

Description

According to the web server banner, the remote host is using a vulnerable version of mod_ssl. This version has a buffer overflow vulnerability. A remote attacker could exploit this issue to execute arbitrary code.

*** Some vendors patched older versions of mod_ssl, so this *** might be a false positive. Check with your vendor to determine *** if you have a version of mod_ssl that is patched for this *** vulnerability.

Solution

Upgrade to mod_ssl 2.8.7 or later.

See Also

https://seclists.org/bugtraq/2002/Feb/376

Plugin Details

Severity: High

ID: 10888

File Name: mod_ssl_overflow.nasl

Version: 1.34

Type: remote

Family: Web Servers

Published: 3/8/2002

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, www/apache

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/27/2002

Reference Information

CVE: CVE-2002-0082

BID: 4189