ID

VAR-200208-0244


CVE

CVE-2002-0656


TITLE

OpenSSL clients contain a buffer overflow during the SSL3 handshake process

Trust: 0.8

sources: CERT/CC: VU#258555

DESCRIPTION

Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3. The DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10 contains buffer overflows in code that handles responses for network name and address requests. Other resolver libraries derived from BIND 4 such as BSD libc, GNU glibc, and those used by System V UNIX systems may also be affected. An attacker could execute arbitrary code with the privileges of the application that made the request or cause a denial of service. This vulnerability is resolved in BIND versions 4.9.11, 8.2.7, 8.3.4, and BIND 9. Based on recent reports, we believe this vulnerability is being actively exploited. OpenSSL is an open-source implementation of the Secure Sockets Layer (SSL) protocol. A remotely exploitable vulnerability exists in OpenSSL servers that could lead to the execution of arbitrary code on the server. OpenSSL Is OpenSSL On the server SSL version 2.0 ( Less than, SSLv2) The buffer overflow vulnerability is caused by handshake processing. The issue occurs in the handling of the client key value during the negotiation of the SSLv2 protocol. ***UPDATE: A worm that likely exploits this vulnerability has been discovered propagating in the wild. Additionally, this code includes peer-to-peer and distributed denial-of-service capabilities. There have been numerous reports of intrusions in Europe. It is not yet confirmed whether this vulnerability is in OpenSSL, mod_ssl, or another component. Administrators are advised to upgrade to the most recent versions or to disable Apache, if possible, until more information is available. OpenSSL is prone to a buffer-overflow vulnerability involving overly long SSLv3 session IDs. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. -----BEGIN PGP SIGNED MESSAGE----- CERT Summary CS-2002-04 November 26, 2002 Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT Summary to draw attention to the types of attacks reported to our incident response team, as well as other noteworthy incident and vulnerability information. The summary includes pointers to sources of information for dealing with the problems. Past CERT summaries are available from: CERT Summaries http://www.cert.org/summaries/ ______________________________________________________________________ Recent Activity Since the last regularly scheduled CERT summary, issued in August 2002 (CS-2002-03), we have seen trojan horses for three popular distributions, new self-propagating malicious code (Apache/mod_ssl), and multiple vulnerabilities in BIND. In addition, we have issued a new PGP Key. For more current information on activity being reported to the CERT/CC, please visit the CERT/CC Current Activity page. The Current Activity page is a regularly updated summary of the most frequent, high-impact types of security incidents and vulnerabilities being reported to the CERT/CC. The information on the Current Activity page is reviewed and updated as reporting trends change. CERT/CC Current Activity http://www.cert.org/current/current_activity.html 1. Reports received by the CERT/CC indicate that the Apache/mod_ssl worm has already infected thousands of systems. Over a month earlier, the CERT/CC issued an advisory (CA-2002-23) describing four remotely exploitable buffer overflows in OpenSSL. Trojan Horse Sendmail Distribution The CERT/CC has received confirmation that some copies of the source code for the Sendmail package have been modified by an intruder to contain a Trojan horse. These copies began to appear in downloads from the FTP server ftp.sendmail.org on or around September 28, 2002. On October 8, 2002, the CERT/CC issued an advisory (CA-2002-28) describing various methods to verify software authenticity. CERT Advisory CA-2002-28 Trojan Horse Sendmail Distribution http://www.cert.org/advisories/CA-2002-28.html 3. Trojan Horse tcpdump and libpcap Distributions The CERT/CC has received reports that some copies of the source code for libpcap, a packet acquisition library, and tcpdump, a network sniffer, have been modified by an intruder and contain a Trojan horse. These modified distributions began to appear in downloads from the HTTP server www.tcpdump.org on or around Nov 11, 2002. The CERT/CC issued an advisory (CA-2002-30) listing MD5 checksums and official distribution sites for libpcap and tcpdump. CERT Advisory CA-2002-30 Trojan Horse tcpdump and libpcap Distributions http://www.cert.org/advisories/CA-2002-30.html 4. Multiple Vulnerabilities in BIND The CERT/CC has documented multiple vulnerabilities in BIND, the popular domain name server and client library software package from the Internet Software Consortium (ISC). Several vulnerabilities are referenced in the advisory; they are listed here individually. CERT Advisory CA-2002-31 Multiple Vulnerabilities in BIND http://www.cert.org/advisories/CA-2002-31.html Vulnerability Note #852283 Cached malformed SIG record buffer overflow http://www.kb.cert.org/vuls/id/852283 Vulnerability Note #229595 Overly large OPT record assertion http://www.kb.cert.org/vuls/id/229595 Vulnerability Note #581682 ISC Bind 8 fails to properly dereference cache SIG RR elements invalid expiry times from the internal database http://www.kb.cert.org/vuls/id/581682 Vulnerability Note #844360 Domain Name System (DNS) stub resolver libraries vulnerable to buffer overflows via network name or address lookups http://www.kb.cert.org/vuls/id/844360 5. Heap Overflow Vulnerability in Microsoft Data Access Components (MDAC) On November 21, 2002 the CERT/CC issued an advisory (CA-2002-33) describing a vulnerability in MDAC, a collection of Microsoft utilities and routines that process requests between databases and network applications. CERT Advisory CA-2002-33 Heap Overflow Vulnerability in Microsoft Data Access Components (MDAC) http://www.cert.org/advisories/CA-2002-33.html ______________________________________________________________________ New CERT/CC PGP Key On September 19, the CERT/CC issued a new PGP key, which should be used when sending sensitive information to the CERT/CC. CERT/CC PGP Public Key https://www.cert.org/pgp/cert_pgp_key.asc Sending Sensitive Information To The CERT/CC http://www.cert.org/contact_cert/encryptmail.html ______________________________________________________________________ What's New and Updated Since the last CERT Summary, we have published new and updated * Advisories http://www.cert.org/advisories/ * Congressional Testimony http://www.cert.org/congressional_testimony/ * CERT/CC Statistics http://www.cert.org/stats/cert_stats.html * Home User Security http://www.cert.org/homeusers/HomeComputerSecurity * Tech Tips http://www.cert.org/tech_tips/ * Training Schedule http:/www.cert.org/training/ ______________________________________________________________________ This document is available from: http://www.cert.org/summaries/CS-2002-04.html ______________________________________________________________________ CERT/CC Contact Information Email: cert@cert.org Phone: +1 412-268-7090 (24-hour hotline) Fax: +1 412-268-6989 Postal address: CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 U.S.A. CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends. Using encryption We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key If you prefer to use DES, please call the CERT hotline for more information. Getting security information CERT publications and other security information are available from our web site http://www.cert.org/ To subscribe to the CERT mailing list for advisories and bulletins, send email to majordomo@cert.org. Please include in the body of your message subscribe cert-advisory * "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office. ______________________________________________________________________ NO WARRANTY Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. _________________________________________________________________ Conditions for use, disclaimers, and sponsorship information Copyright \xa92002 Carnegie Mellon University. -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 iQCVAwUBPePMQWjtSoHZUTs5AQGdxwP9HK4mSF15bMQ9MZ4mMFcLIhvdXykANg8A 6nEIAyB8CJpbuWdP7sPh3qAwaZ9BhRFEGeLakONOpoo7bmjkwAWrJHxF3b1CrgHS ZuKQsgEhnm9wpPdU6w6SG1cJBkwz70b8d7YK0vcVuKhmaW0JOx9OLGKsAe3SFePD OiZbNHX+eb8= =Mnbn -----END PGP SIGNATURE----- . OpenSSL Security Advisory [30 July 2002] This advisory consists of two independent advisories, merged, and is an official OpenSSL advisory. Advisory 1 ========== A.L. Digital Ltd and The Bunker (http://www.thebunker.net/) are conducting a security review of OpenSSL, under the DARPA program CHATS. 1. The client master key in SSL2 could be oversized and overrun a buffer. Exploit code is NOT available at this time. 2. 3. This issues only affects OpenSSL 0.9.7 before 0.9.7-beta3 with Kerberos enabled. 4. Various buffers for ASCII representations of integers were too small on 64 bit platforms. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0656 to issues 1-2, CAN-2002-0657 to issue 3, and CAN-2002-0655 to issue 4. In addition various potential buffer overflows not known to be exploitable have had assertions added to defend against them. Who is affected? ---------------- Everyone using OpenSSL 0.9.6d or earlier, or 0.9.7-beta2 or earlier or current development snapshots of 0.9.7 to provide SSL or TLS is vulnerable, whether client or server. 0.9.6d servers on 32-bit systems with SSL 2.0 disabled are not vulnerable. SSLeay is probably also affected. Recommendations --------------- Apply the attached patch to OpenSSL 0.9.6d, or upgrade to OpenSSL 0.9.6e. Recompile all applications using OpenSSL to provide SSL or TLS. A patch for 0.9.7 is available from the OpenSSL website (https://www.openssl.org/). Servers can disable SSL2, alternatively disable all applications using SSL or TLS until the patches are applied. Users of 0.9.7 pre-release versions with Kerberos enabled will also have to disable Kerberos. Client should be disabled altogether until the patches are applied. Known Exploits -------------- There are no know exploits available for these vulnerabilities. As noted above, Neohapsis have demonstrated internally that an exploit is possible, but have not released the exploit code. References ---------- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657 Acknowledgements ---------------- The project leading to this advisory is sponsored by the Defense Advanced Research Projects Agency (DARPA) and Air Force Research Laboratory, Air Force Materiel Command, USAF, under agreement number F30602-01-2-0537. The patch and advisory were prepared by Ben Laurie. Advisory 2 ========== Vulnerabilities --------------- The ASN1 parser can be confused by supplying it with certain invalid encodings. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0659 to this issue. Who is affected? ---------------- Any OpenSSL program which uses the ASN1 library to parse untrusted data. This includes all SSL or TLS applications, those using S/MIME (PKCS#7) or certificate generation routines. Recommendations --------------- Apply the patch to OpenSSL, or upgrade to OpenSSL 0.9.6e. Recompile all applications using OpenSSL. Users of 0.9.7 pre-release versions should apply the patch or upgrade to 0.9.7-beta3 or later. Recompile all applications using OpenSSL. References ---------- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659 Acknowledgements ---------------- This vulnerability was discovered by Adi Stav <stav@mercury.co.il> and James Yonan <jim@ntlp.com> independently. The patch is partly based on a version by Adi Stav. The patch and advisory were prepared by Dr. Stephen Henson. Combined patches for OpenSSL 0.9.6d: https://www.openssl.org/news/patch_20020730_0_9_6d.txt Combined patches for OpenSSL 0.9.7 beta 2: https://www.openssl.org/news/patch_20020730_0_9_7.txt URL for this Security Advisory: https://www.openssl.org/news/secadv_20020730.txt

Trust: 6.84

sources: NVD: CVE-2002-0656 // CERT/CC: VU#258555 // CERT/CC: VU#844360 // CERT/CC: VU#852283 // CERT/CC: VU#581682 // CERT/CC: VU#229595 // CERT/CC: VU#102795 // JVNDB: JVNDB-2002-000172 // BID: 5363 // BID: 5362 // VULHUB: VHN-5047 // VULMON: CVE-2002-0656 // PACKETSTORM: 30532 // PACKETSTORM: 169647

AFFECTED PRODUCTS

vendor:apple computermodel: - scope: - version: -

Trust: 4.8

vendor:ibmmodel: - scope: - version: -

Trust: 4.0

vendor:red hatmodel: - scope: - version: -

Trust: 4.0

vendor:hewlett packardmodel: - scope: - version: -

Trust: 3.2

vendor:debianmodel: - scope: - version: -

Trust: 2.4

vendor:mandrakesoftmodel: - scope: - version: -

Trust: 2.4

vendor:netbsdmodel: - scope: - version: -

Trust: 2.4

vendor:susemodel: - scope: - version: -

Trust: 2.4

vendor:trustixmodel: - scope: - version: -

Trust: 2.4

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 1.7

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.0.1

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.0.2

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.0.3

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.0.4

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1.1

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1.2

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1.3

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1.4

Trust: 1.7

vendor:applemodel:mac os xscope:eqversion:10.1.5

Trust: 1.7

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 1.6

vendor:guardian digitalmodel: - scope: - version: -

Trust: 1.6

vendor:junipermodel: - scope: - version: -

Trust: 1.6

vendor:openldapmodel: - scope: - version: -

Trust: 1.6

vendor:openpkgmodel: - scope: - version: -

Trust: 1.6

vendor:opensslmodel: - scope: - version: -

Trust: 1.6

vendor:oraclemodel: - scope: - version: -

Trust: 1.6

vendor:secure computingmodel: - scope: - version: -

Trust: 1.6

vendor:iscmodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:nortelmodel: - scope: - version: -

Trust: 1.6

vendor:opensslmodel:opensslscope:eqversion:0.9.1c

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.2b

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.3

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.4

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.5

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.5a

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.6

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.6a

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.6b

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.6c

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.6d

Trust: 1.1

vendor:opensslmodel:opensslscope:eqversion:0.9.7

Trust: 1.1

vendor:oraclemodel:application serverscope:eqversion:*

Trust: 1.1

vendor:oraclemodel:application serverscope:eqversion:1.0.2

Trust: 1.1

vendor:oraclemodel:application serverscope:eqversion:1.0.2.1s

Trust: 1.1

vendor:oraclemodel:application serverscope:eqversion:1.0.2.2

Trust: 1.1

vendor:oraclemodel:corporate time outlook connectorscope:eqversion:3.1

Trust: 1.1

vendor:oraclemodel:corporate time outlook connectorscope:eqversion:3.1.1

Trust: 1.1

vendor:oraclemodel:corporate time outlook connectorscope:eqversion:3.1.2

Trust: 1.1

vendor:oraclemodel:corporate time outlook connectorscope:eqversion:3.3

Trust: 1.1

vendor:applemodel:mac os xscope:eqversion:10.0

Trust: 1.1

vendor:alcatelmodel: - scope: - version: -

Trust: 0.8

vendor:gnu glibcmodel: - scope: - version: -

Trust: 0.8

vendor:metasolvmodel: - scope: - version: -

Trust: 0.8

vendor:sgimodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:the sco groupmodel: - scope: - version: -

Trust: 0.8

vendor:xeroxmodel: - scope: - version: -

Trust: 0.8

vendor:conectivamodel: - scope: - version: -

Trust: 0.8

vendor:engardemodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:the openpkgmodel: - scope: - version: -

Trust: 0.8

vendor:covalentmodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:opensslmodel:opensslscope:lteversion:0.9.6d

Trust: 0.8

vendor:oraclemodel:application serverscope:lteversion:1.0.2.2

Trust: 0.8

vendor:oraclemodel:application serverscope:eqversion:9.0.2.0.0

Trust: 0.8

vendor:oraclemodel:application serverscope:eqversion:9ias

Trust: 0.8

vendor:oraclemodel:databasescope:lteversion:8.1.7.1

Trust: 0.8

vendor:oraclemodel:databasescope:lteversion:9.0.2

Trust: 0.8

vendor:oraclemodel:databasescope:eqversion:9.2.0

Trust: 0.8

vendor:sun microsystemsmodel:cobalt raq3scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:cobalt raq4scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:cobalt raqxtrscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.00

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.20

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.22

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.04

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:6.2

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.0

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.1

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.2

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.3

Trust: 0.8

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.6

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.6

vendor:hpmodel:internet express eakscope:eqversion:2.0

Trust: 0.6

vendor:gentoomodel:linuxscope:eqversion:1.2

Trust: 0.6

vendor:ibmmodel:linux affinity toolkitscope: - version: -

Trust: 0.6

vendor:oraclemodel:oracle9i application server .1sscope:eqversion:1.0.2

Trust: 0.6

vendor:gentoomodel:linux rc3scope:eqversion:1.4

Trust: 0.6

vendor:gentoomodel:linuxscope:eqversion:0.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.6

vendor:hpmodel:openssl for openvms alphascope:eqversion:1.0

Trust: 0.6

vendor:opensslmodel:project openssl beta3scope:neversion:0.9.7

Trust: 0.6

vendor:gentoomodel:linux rc1scope:eqversion:1.4

Trust: 0.6

vendor:hpmodel:webproxyscope:eqversion:2.0

Trust: 0.6

vendor:hpmodel:tru64 unix compaq secure web serverscope:neversion:5.9.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.6

vendor:oraclemodel:corporatetime outlook connectorscope:eqversion:3.3

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.6

vendor:covalentmodel:enterprise ready serverscope:eqversion:2.2

Trust: 0.6

vendor:novellmodel:netmail bscope:eqversion:3.10

Trust: 0.6

vendor:covalentmodel:enterprise ready serverscope:eqversion:2.1

Trust: 0.6

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.6

vendor:novellmodel:netmail escope:neversion:3.10

Trust: 0.6

vendor:hpmodel:virtualvaultscope:eqversion:4.6

Trust: 0.6

vendor:hpmodel:tru64 unix compaq secure web serverscope:eqversion:5.8.1

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.6

vendor:novellmodel:netmail ascope:eqversion:3.10

Trust: 0.6

vendor:novellmodel:netmailscope:eqversion:3.10

Trust: 0.6

vendor:opensslmodel:project openssl gscope:neversion:0.9.6

Trust: 0.6

vendor:hpmodel:tru64 unix compaq secure web serverscope:neversion:5.8.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.6

vendor:oraclemodel:corporatetime outlook connectorscope:eqversion:3.1.2

Trust: 0.6

vendor:oraclemodel:corporatetime outlook connectorscope:eqversion:3.1.1

Trust: 0.6

vendor:hpmodel:webproxyscope:eqversion:1.0

Trust: 0.6

vendor:novellmodel:netmail cscope:eqversion:3.10

Trust: 0.6

vendor:oraclemodel:oracle9i application serverscope:eqversion:1.0.2

Trust: 0.6

vendor:opensslmodel:project openssl escope:neversion:0.9.6

Trust: 0.6

vendor:oraclemodel:corporatetime outlook connectorscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.6

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.6

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.6

vendor:covalentmodel:fast start serverscope:eqversion:3.1

Trust: 0.6

vendor:hpmodel:tru64 unix internet expressscope:eqversion:5.9

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.6

vendor:hpmodel:tcp/ip services for openvmsscope:eqversion:5.3

Trust: 0.6

vendor:hpmodel:openssl for openvms alpha -ascope:neversion:1.0

Trust: 0.6

vendor:oraclemodel:oracle9i application serverscope:eqversion:1.0.2.2

Trust: 0.6

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.6

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.6

vendor:oraclemodel:oracle9i application serverscope: - version: -

Trust: 0.6

vendor:hpmodel:virtualvaultscope:eqversion:4.5

Trust: 0.6

vendor:hpmodel:tru64 unix compaq secure web serverscope:neversion:5.9.2

Trust: 0.6

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.6

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.6

vendor:novellmodel:netmail dscope:eqversion:3.10

Trust: 0.6

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.6

vendor:gentoomodel:linux ascope:eqversion:1.1

Trust: 0.6

vendor:hpmodel:secure os software for linuxscope:eqversion:1.0

Trust: 0.6

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.6

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.6

vendor:gentoomodel:linux rc2scope:eqversion:1.4

Trust: 0.6

vendor:redhatmodel:mgetty-sendfax-1.1.14-8.i386.rpmscope:eqversion:2.2

Trust: 0.6

vendor:gentoomodel:linuxscope:eqversion:0.5

Trust: 0.6

vendor:ibmmodel:http serverscope:eqversion:1.3.19

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.35

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.1.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.39

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.32

Trust: 0.3

vendor:apachemodel:-devscope:eqversion:1.3.7

Trust: 0.3

vendor:rsamodel:bsafe ssl-j sdkscope:neversion:3.0.1

Trust: 0.3

vendor:apachemodel:-betascope:eqversion:2.0.32

Trust: 0.3

vendor:rsamodel:bsafe ssl-cscope:eqversion:2.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.22

Trust: 0.3

vendor:sonicwallmodel:ssl-r6scope:eqversion:4.0.18

Trust: 0.3

vendor:rsamodel:bsafe ssl-cscope:eqversion:2.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.9

Trust: 0.3

vendor:securecomputingmodel:safeword premieraccessscope:eqversion:3.1

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.4

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.16

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.6

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.13

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.0.5

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.20

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.26

Trust: 0.3

vendor:rsamodel:bsafe ssl-c mescope:neversion: -

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.25

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.37

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.14

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.0.2

Trust: 0.3

vendor:rsamodel:bsafe ssl-j sdkscope:neversion:3.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.11

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.4

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.0

Trust: 0.3

vendor:rsamodel:bsafe ssl-j sdkscope:neversion:3.1

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.12

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.1

Trust: 0.3

vendor:sonicwallmodel:ssl-rscope:eqversion:4.0.18

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.38

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.15

Trust: 0.3

vendor:sonicwallmodel:ssl-rxscope:eqversion:4.0.18

Trust: 0.3

vendor:apachemodel:macscope:eqversion:1.3.14

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.24

Trust: 0.3

vendor:apachemodel:betascope:eqversion:2.0.28

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.3

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.40

Trust: 0.3

vendor:rsamodel:bsafe ssl-cscope:eqversion:2.3

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.23

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3

Trust: 0.3

vendor:junipermodel:sdx-300scope:eqversion:3.1.1

Trust: 0.3

vendor:apachemodel:-betascope:eqversion:2.0.34

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.19

Trust: 0.3

vendor:junipermodel:sdx-300scope:eqversion:3.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.18

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.2.5

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.28

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.3

Trust: 0.3

vendor:ciscomodel:secure content acceleratorscope:eqversion:10000

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.0.3

Trust: 0.3

vendor:apachemodel:-betascope:eqversion:2.0.28

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.0.36

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.6

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:1.3.17

Trust: 0.3

vendor:sonicwallmodel:ssl-r3scope:eqversion:4.0.18

Trust: 0.3

vendor:junipermodel:junosscope:eqversion:5.5

Trust: 0.3

vendor:hpmodel:jetdirect rev. u.23.99scope: - version: -

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.1

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:neversion:3.1

Trust: 0.3

vendor:junipermodel:networks m-series router m5scope: - version: -

Trust: 0.3

vendor:alcatel lucentmodel:omniswitchscope:eqversion:88000

Trust: 0.3

vendor:alcatel lucentmodel:omniaccessscope:eqversion:2100

Trust: 0.3

vendor:sunmodel:crypto acceleratorscope:eqversion:1000

Trust: 0.3

vendor:junipermodel:networks m-series router m20scope: - version: -

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.4

Trust: 0.3

vendor:rsamodel:security bsafe ssl-c mescope:neversion: -

Trust: 0.3

vendor:rsamodel:security bsafe ssl-cscope:eqversion:2.3

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.6

Trust: 0.3

vendor:junipermodel:networks m-series router m160scope: - version: -

Trust: 0.3

vendor:junipermodel:networks m-series router m40scope: - version: -

Trust: 0.3

vendor:junipermodel:networks t-series router t320scope: - version: -

Trust: 0.3

vendor:junipermodel:networks sdx-300scope:eqversion:3.1.1

Trust: 0.3

vendor:junipermodel:networks sdx-300scope:eqversion:3.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.2

Trust: 0.3

vendor:alcatel lucentmodel:omniswitchscope:eqversion:77000

Trust: 0.3

vendor:alcatel lucentmodel:rcpscope:eqversion:77700

Trust: 0.3

vendor:junipermodel:networks m-series router m10scope: - version: -

Trust: 0.3

vendor:securemodel:computing safeword premieraccessscope:eqversion:3.1

Trust: 0.3

vendor:junipermodel:networks m-series router m40escope: - version: -

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:neversion:3.0.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.3

Trust: 0.3

vendor:alcatel lucentmodel:omniswitchscope:eqversion:66000

Trust: 0.3

vendor:junipermodel:networks t-series router t640scope: - version: -

Trust: 0.3

vendor:rsamodel:security bsafe ssl-cscope:eqversion:2.2

Trust: 0.3

vendor:rsamodel:security bsafe ssl-cscope:eqversion:2.1

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.0

Trust: 0.3

vendor:rsamodel:security bsafe ssl-j sdkscope:neversion:3.0

Trust: 0.3

vendor:alcatel lucentmodel:omniswitchscope:eqversion:78000

Trust: 0.3

vendor:hpmodel:jetdirect rev. l.23.99scope: - version: -

Trust: 0.3

vendor:hpmodel:jetdirect rev. u.22.00scope: - version: -

Trust: 0.3

vendor:hpmodel:jetdirect rev. l.22.00scope: - version: -

Trust: 0.3

vendor:junipermodel:networks junosscope:eqversion:5.5

Trust: 0.3

sources: CERT/CC: VU#258555 // CERT/CC: VU#844360 // CERT/CC: VU#852283 // CERT/CC: VU#581682 // CERT/CC: VU#229595 // CERT/CC: VU#102795 // VULMON: CVE-2002-0656 // BID: 5363 // BID: 5362 // JVNDB: JVNDB-2002-000172 // CNNVD: CNNVD-200208-027 // NVD: CVE-2002-0656

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0656
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#258555
value: 3.19

Trust: 0.8

CARNEGIE MELLON: VU#844360
value: 8.91

Trust: 0.8

CARNEGIE MELLON: VU#852283
value: 30.38

Trust: 0.8

CARNEGIE MELLON: VU#581682
value: 27.54

Trust: 0.8

CARNEGIE MELLON: VU#229595
value: 33.05

Trust: 0.8

CARNEGIE MELLON: VU#102795
value: 17.63

Trust: 0.8

NVD: CVE-2002-0656
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200208-027
value: HIGH

Trust: 0.6

VULHUB: VHN-5047
value: HIGH

Trust: 0.1

VULMON: CVE-2002-0656
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0656
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-5047
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#258555 // CERT/CC: VU#844360 // CERT/CC: VU#852283 // CERT/CC: VU#581682 // CERT/CC: VU#229595 // CERT/CC: VU#102795 // VULHUB: VHN-5047 // VULMON: CVE-2002-0656 // JVNDB: JVNDB-2002-000172 // CNNVD: CNNVD-200208-027 // NVD: CVE-2002-0656

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0656

THREAT TYPE

network

Trust: 0.6

sources: BID: 5363 // BID: 5362

TYPE

Boundary Condition Error

Trust: 1.2

sources: BID: 5363 // BID: 5362 // CNNVD: CNNVD-200208-027

CONFIGURATIONS

sources: JVNDB: JVNDB-2002-000172

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-5047 // VULMON: CVE-2002-0656

PATCH

title:HPSBUX0209-217url:http://www1.itrc.hp.com/service/cki/docDisplay.do?admit=-682735245+1041818851527+28353475&amp;docId=HPSBUX0209-217

Trust: 0.8

title:HPSBUX0209-217url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0209-217.html

Trust: 0.8

title:secadv_20020730url:http://www.openssl.org/news/secadv_20020730.txt

Trust: 0.8

title:#37url:http://www.oracle.com/technology/deploy/security/htdocs/opensslAlert.html

Trust: 0.8

title:RHSA-2002:155url:https://rhn.redhat.com/errata/RHSA-2002-155.html

Trust: 0.8

title:46424url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-46424-1

Trust: 0.8

title:RHSA-2002:155url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2002-155J.html

Trust: 0.8

title:Debian Security Advisories: DSA-136-1 openssl -- multiple remote exploitsurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=8ab1654e85c2f0d32d45eef6fce839f1

Trust: 0.1

title:LinuxFlawurl:https://github.com/mudongliang/LinuxFlaw

Trust: 0.1

title:cve-url:https://github.com/oneoy/cve-

Trust: 0.1

sources: VULMON: CVE-2002-0656 // JVNDB: JVNDB-2002-000172

EXTERNAL IDS

db:NVDid:CVE-2002-0656

Trust: 3.3

db:BIDid:5362

Trust: 3.1

db:CERT/CCid:VU#102795

Trust: 2.9

db:CERT/CCid:VU#258555

Trust: 2.8

db:BIDid:5363

Trust: 1.5

db:CERT/CCid:VU#844360

Trust: 0.9

db:CERT/CCid:VU#852283

Trust: 0.9

db:CERT/CCid:VU#581682

Trust: 0.9

db:CERT/CCid:VU#229595

Trust: 0.9

db:JVNDBid:JVNDB-2002-000172

Trust: 0.8

db:CNNVDid:CNNVD-200208-027

Trust: 0.7

db:EXPLOIT-DBid:40347

Trust: 0.2

db:SEEBUGid:SSVID-75494

Trust: 0.1

db:SEEBUGid:SSVID-75495

Trust: 0.1

db:VULHUBid:VHN-5047

Trust: 0.1

db:VULMONid:CVE-2002-0656

Trust: 0.1

db:PACKETSTORMid:30532

Trust: 0.1

db:PACKETSTORMid:169647

Trust: 0.1

sources: CERT/CC: VU#258555 // CERT/CC: VU#844360 // CERT/CC: VU#852283 // CERT/CC: VU#581682 // CERT/CC: VU#229595 // CERT/CC: VU#102795 // VULHUB: VHN-5047 // VULMON: CVE-2002-0656 // BID: 5363 // BID: 5362 // JVNDB: JVNDB-2002-000172 // PACKETSTORM: 30532 // PACKETSTORM: 169647 // CNNVD: CNNVD-200208-027 // NVD: CVE-2002-0656

REFERENCES

url:http://www.securityfocus.com/bid/5362

Trust: 2.8

url:http://www.isc.org/products/bind/bind-security.html

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/102795

Trust: 2.2

url:http://www.cert.org/advisories/ca-2002-23.html

Trust: 2.1

url:http://www.kb.cert.org/vuls/id/258555

Trust: 2.0

url:about vulnerability notes

Trust: 1.6

url:contact us about this vulnerability

Trust: 1.6

url:provide a vendor statement

Trust: 1.6

url:http://bvlive01.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=21469

Trust: 1.6

url:http://www.ciac.org/ciac/bulletins/n-013.shtml

Trust: 1.6

url:http://www.securityfocus.com/bid/5363

Trust: 1.2

url:ftp://ftp.caldera.com/pub/security/openlinux/cssa-2002-033.0.txt

Trust: 1.2

url:ftp://ftp.caldera.com/pub/security/openlinux/cssa-2002-033.1.txt

Trust: 1.2

url:ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-02:33.openssl.asc

Trust: 1.2

url:http://www.linux-mandrake.com/en/security/2002/mdksa-2002-046.php

Trust: 1.2

url:http://www.iss.net/security_center/static/9714.php

Trust: 1.2

url:http://www.iss.net/security_center/static/9716.php

Trust: 1.2

url:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513

Trust: 1.1

url:http://www.cert.org/advisories/ca-2002-27.html

Trust: 0.9

url:http://wp.netscape.com/eng/ssl3/draft302.txt

Trust: 0.8

url:http://www.isc.org/products/bind/patches/bind4910.diff

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/m-103.shtml

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-0656

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/20020731openssl.html

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2002/wr023001.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2002/wr023101.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2002/wr023201.txt

Trust: 0.8

url:http://www.jpcert.or.jp/wr/2002/wr023601.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnca-2002-27

Trust: 0.8

url:http://jvn.jp/cert/jvnca-2002-23

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-0656

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/20030424_144742.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/20030416_114510.html

Trust: 0.8

url:http://support.novell.com/cgi-bin/search/searchtid.cgi?/2965676.htm

Trust: 0.6

url:http://otn.oracle.com/deploy/security/htdocs/opensslalert.html

Trust: 0.6

url:http://www.rsasecurity.com/products/bsafe/bulletins/bsafe_ssl_products_security_bulletin_aug_8_2002.pdf

Trust: 0.6

url:http://docs.info.apple.com/article.html?artnum=120139

Trust: 0.6

url:http://docs.info.apple.com/article.html?artnum=120141

Trust: 0.6

url:http://www.openssl.org/news/secadv_20020730.txt

Trust: 0.4

url:http://support.coresecurity.com/impact/exploits/b4bc2930d33dc6d98cf1c6c819f241e1.html

Trust: 0.3

url:http://www.sonicwall.com/support/security_advisories/security_advisory-openssl.html

Trust: 0.3

url:http://www.hp.com/cposupport/networking/support_doc/bpj05999.html#p26_2431

Trust: 0.3

url:http://sunsolve.sun.com/securitypatch

Trust: 0.3

url: -

Trust: 0.1

url:http://distro.conectiva.com.br/atualizacoes/?id=a&amp;anuncio=000513

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/http-openssl-malformed-client-key-bof

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/40347/

Trust: 0.1

url:https://www.tcpdump.org

Trust: 0.1

url:http://www.cert.org/summaries/cs-2002-04.html

Trust: 0.1

url:http://www.cert.org/advisories/

Trust: 0.1

url:http://www.cert.org/homeusers/homecomputersecurity

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/852283

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/581682

Trust: 0.1

url:http://www.cert.org/summaries/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/844360

Trust: 0.1

url:http://www.cert.org/stats/cert_stats.html

Trust: 0.1

url:http://www.cert.org/congressional_testimony/

Trust: 0.1

url:http://www.cert.org/advisories/ca-2002-31.html

Trust: 0.1

url:http://www.cert.org/current/current_activity.html

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/229595

Trust: 0.1

url:https://www.cert.org/training/

Trust: 0.1

url:http://www.cert.org/

Trust: 0.1

url:http://www.cert.org/contact_cert/encryptmail.html

Trust: 0.1

url:http://www.cert.org/cert_pgp.key

Trust: 0.1

url:https://www.cert.org/pgp/cert_pgp_key.asc

Trust: 0.1

url:http://www.cert.org/advisories/ca-2002-30.html

Trust: 0.1

url:http://www.cert.org/tech_tips/

Trust: 0.1

url:http://www.cert.org/advisories/ca-2002-33.html

Trust: 0.1

url:http://www.cert.org/advisories/ca-2002-28.html

Trust: 0.1

url:http://www.neohapsis.com/)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-0656

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-0657

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2002-0657

Trust: 0.1

url:https://www.openssl.org/news/patch_20020730_0_9_6d.txt

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2002-0656

Trust: 0.1

url:http://www.thebunker.net/)

Trust: 0.1

url:https://www.openssl.org/news/patch_20020730_0_9_7.txt

Trust: 0.1

url:https://www.openssl.org/).

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2002-0655

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2002-0655

Trust: 0.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2002-0659

Trust: 0.1

sources: CERT/CC: VU#258555 // CERT/CC: VU#844360 // CERT/CC: VU#852283 // CERT/CC: VU#581682 // CERT/CC: VU#229595 // CERT/CC: VU#102795 // VULHUB: VHN-5047 // VULMON: CVE-2002-0656 // BID: 5363 // BID: 5362 // JVNDB: JVNDB-2002-000172 // PACKETSTORM: 30532 // PACKETSTORM: 169647 // NVD: CVE-2002-0656

CREDITS

A.L. Digital Ltd The Bunker

Trust: 0.6

sources: CNNVD: CNNVD-200208-027

SOURCES

db:CERT/CCid:VU#258555
db:CERT/CCid:VU#844360
db:CERT/CCid:VU#852283
db:CERT/CCid:VU#581682
db:CERT/CCid:VU#229595
db:CERT/CCid:VU#102795
db:VULHUBid:VHN-5047
db:VULMONid:CVE-2002-0656
db:BIDid:5363
db:BIDid:5362
db:JVNDBid:JVNDB-2002-000172
db:PACKETSTORMid:30532
db:PACKETSTORMid:169647
db:CNNVDid:CNNVD-200208-027
db:NVDid:CVE-2002-0656

LAST UPDATE DATE

2024-08-14T13:08:48.692000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#258555date:2002-09-30T00:00:00
db:CERT/CCid:VU#844360date:2003-04-24T00:00:00
db:CERT/CCid:VU#852283date:2004-10-18T00:00:00
db:CERT/CCid:VU#581682date:2003-02-25T00:00:00
db:CERT/CCid:VU#229595date:2003-05-30T00:00:00
db:CERT/CCid:VU#102795date:2002-09-30T00:00:00
db:VULHUBid:VHN-5047date:2008-09-10T00:00:00
db:VULMONid:CVE-2002-0656date:2008-09-10T00:00:00
db:BIDid:5363date:2007-12-20T17:11:00
db:BIDid:5362date:2007-11-15T00:40:00
db:JVNDBid:JVNDB-2002-000172date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200208-027date:2006-09-21T00:00:00
db:NVDid:CVE-2002-0656date:2008-09-10T19:12:40.070

SOURCES RELEASE DATE

db:CERT/CCid:VU#258555date:2002-07-30T00:00:00
db:CERT/CCid:VU#844360date:2002-11-13T00:00:00
db:CERT/CCid:VU#852283date:2002-11-13T00:00:00
db:CERT/CCid:VU#581682date:2002-11-13T00:00:00
db:CERT/CCid:VU#229595date:2002-11-13T00:00:00
db:CERT/CCid:VU#102795date:2002-07-30T00:00:00
db:VULHUBid:VHN-5047date:2002-08-12T00:00:00
db:VULMONid:CVE-2002-0656date:2002-08-12T00:00:00
db:BIDid:5363date:2002-07-30T00:00:00
db:BIDid:5362date:2002-07-30T00:00:00
db:JVNDBid:JVNDB-2002-000172date:2007-04-01T00:00:00
db:PACKETSTORMid:30532date:2002-11-30T11:13:52
db:PACKETSTORMid:169647date:2002-07-30T12:12:12
db:CNNVDid:CNNVD-200208-027date:2002-07-30T00:00:00
db:NVDid:CVE-2002-0656date:2002-08-12T04:00:00