Files
CVEs-PoC/2002/CVE-2002-0082.md
2025-09-29 21:09:30 +02:00

25 lines
1.3 KiB
Markdown

### [CVE-2002-0082](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0082)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
### POC
#### Reference
- http://packetstormsecurity.com/files/153567/Apache-mod_ssl-OpenSSL-Remote-Buffer-Overflow.html
#### Github
- https://github.com/0xcybermonk/Kioptrix-Pentest-Report
- https://github.com/Abdibimantara/Vulnerability-Asessment-Kioptrix-Level-1-Vulnhub
- https://github.com/Dekiridi/ZeroHealth-Corp-Vulnerability-Assessment-Project
- https://github.com/Nishant-Pall/Kioptrix-exploit
- https://github.com/davincico/ChatGPT-2-HACKER
- https://github.com/piyush-saurabh/exploits
- https://github.com/ratiros01/CVE-2002-0082
- https://github.com/rosonsec/Exploits