2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-0655" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2002-08-12T04:00:00.000" ,
"lastModified" : "2008-09-10T19:12:39.993" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, does not properly handle ASCII representations of integers on 64 bit platforms, which could allow attackers to cause a denial of service and possibly execute arbitrary code."
} ,
{
"lang" : "es" ,
"value" : "OpenSSL 0.9.6.d y anteriores, y 0.9.7-beta2 y anteriores, no manejan adecuadamente las representaciones ASCII de enteros en plataformas de 64 bits, lo que podr\u00eda permitir a atacantes causar una denegaci\u00f3n de servicio y posiblemente ejecutar c\u00f3digo arbitrario."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 7.5
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14D983EC-61B0-4FD9-89B5-9878E4CE4405"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5D7BE3C-8CA2-4FB2-B4AE-B201D88C2A9D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BC4C5F05-BC0B-478D-9A6F-7C804777BA41"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8847BD34-BDE6-4AE9-96D9-75B9CF93A6A8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EDB5A09-BE86-4352-9799-A875649EDB7D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F03FA9C0-24C7-46AC-92EC-7834BC34C79B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5E4742C-A983-4F00-B24F-AB280C0E876D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A0628DF-3A4C-4078-B615-22260671EABF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "962FCB86-15AD-4399-8B7D-EC1DEA919C59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0FCA45CE-4127-47AD-BBA8-8A6DD83AE1C7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7CA1CA40-7DB5-4DCA-97A8-9A8CF4FECECC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E3AB748-E463-445C-ABAB-4FEDDFD1878B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "660E4B8D-AABA-4520-BC4D-CF8E76E07C05"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:application_server:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD38E99A-864A-4E99-B6A5-12AACDA822E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:application_server:1.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC62E1B2-6964-4459-A1EF-A6A087C2960F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6A6F28FD-6EAD-4EDD-B9A1-0B120D0F0919"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DC4ED2EB-1E90-4E99-AAD6-5D838800F9B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DABDE61F-A7DD-40A4-9569-8525A63BAA56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FFAA0056-56FF-4D0F-8B44-066A4BFED1B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C3C821C-C479-4AAC-84EA-63C798CAB00A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:corporate_time_outlook_connector:3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CCAF6167-65C1-4ACB-A75A-53922B64D281"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:9.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B72A661-9EAA-4B9B-8865-17C8A29871BB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:oracle:http_server:9.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7485BFF1-6863-4165-BE36-D656F39CF5EF"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "99C273D1-ADFE-4B4C-B543-7B9CA741A117"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "77CC671C-6D89-4279-86F7-DDE1D4D9A0CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "066ABC3B-B395-42D2-95C0-5B810F91A6F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "01BC19FC-6E03-4000-AE4B-232E47FA76F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "421FC2DD-0CF7-44A2-A63C-5221689E2363"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F8B70BC-42B7-453A-B506-7BE69D49A4B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA32F7D8-02F8-4CFE-B193-2888807BC4D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9DCDE70-07DA-4F0B-805F-6BA03D410CD6"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.cert.org/advisories/CA-2002-23.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/308891" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-046.php" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/5364" ,
"source" : "cve@mitre.org"
}
]
}