FreeBSD Security Advisory 2002.33...

- AV AC AU C I A
发布: 2002-08-06
修订: 2025-04-13

FreeBSD Security Advisory FreeBSD-SA-02:33 - OpenSSL prior to v0.9.6e contains several remotely exploitable buffer overflows, including errors in the handling of the client master key in the SSL2 protocol implementation; the handling of the session ID in the SSL3 protocol; and in the handling of buffers used for representing integers in ASCII on 64-bit platforms. Disabling the SSL2 protocol in server applications should render server exploits harmless. There is no known workaround for client applications.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息