Korean
<< Back
VID 22122
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The OpenSSL has a buffer overflow vulnerability related to ASCII representation of integers.
SSL(Secure Sockets Layer) and TLS(Transport Layer Security) protocols are used to provide a secure connection between a client and a server for higher level protocols such as HTTP. OpenSSL is an open-source implementation of the SSL and TLS protocols that is included with many Linux distributions.
OpenSSL versions 0.9.6d and earlier, 0.9.7-beta2 and earlier, and the current development snapshots of 0.9.7 are vulnerable to a buffer overflow, caused by insufficient bound-checking of ASCII representations of integers on 64 bit platforms. By sending an overly large ASCII integer to an OpenSSL server, a remote attacker could overflow a buffer and execute arbitrary code with code with the privileges of the vulnerable application, service or client or cause the system to crash.

* Platforms affected:
OpenSSL 0.9.6d and earlier
OpenSSL 0.9.7-b2 and earlier

* Note : this check item solely relies on the OpenSSL version number.

* References:
http://online.securityfocus.com/bid/5364
http://www.cert.org/advisories/CA-2002-23.html
Recommendation Upgrade to version 0.9.6e (0.9.7beta3) newer.

-- OR --

Apply the patches provided by your vendors.

* Combined patches for OpenSSL 0.9.6d: http://www.openssl.org/news/patch_20020730_0_9_6d.txt
* Combined patches for OpenSSL 0.9.7 beta 2: http://www.openssl.org/news/patch_20020730_0_9_7.txt
Related URL CVE-2002-0655 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)