search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenSSL clients contain a buffer overflow during the SSL3 handshake process

Vulnerability Note VU#258555

Original Release Date: 2002-07-30 | Last Revised: 2002-09-30

Overview

OpenSSL is an open-source implementation of the Secure Sockets Layer (SSL) protocol. A remotely exploitable vulnerability exists in OpenSSL clients that could lead to the execution of arbitrary code on the client's system.

Description

OpenSSL clients using SSLv3 prior to version 0.9.6e and pre-release version 0.9.7-beta2 contain a buffer overflow vulnerability. A malicious server can exploit this by sending a large session ID to the client during the handshake process.

Impact

A remote attacker may be able to execute arbitrary code on the client system with the privileges of the current user.

Solution

Apply the relevant patches to the OpenSSL client or upgrade to OpenSSL 0.9.6e. Note that applications statically linking to OpenSSL libraries may need to be recompiled with the corrected version of OpenSSL.

Vendor Information

258555
 

View all 24 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to A.L. Digital Ltd for discovering and reporting on this vulnerability.

This document was written by Jason A Rafail and Jeffrey S. Havrilla.

Other Information

CVE IDs: CVE-2002-0656
CERT Advisory: CA-2002-23
Severity Metric: 3.19
Date Public: 2002-07-30
Date First Published: 2002-07-30
Date Last Updated: 2002-09-30 20:50 UTC
Document Revision: 38

Sponsored by CISA.