Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2002-0653

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and earlier, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 56.8%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.6
References
Products affected by CVE-2002-0653
  • Modssl » Mod Ssl » Version: 2.0.39
    cpe:2.3:a:modssl:mod_ssl:2.0.39
  • Modssl » Mod Ssl » Version: 2.0.40
    cpe:2.3:a:modssl:mod_ssl:2.0.40
  • Modssl » Mod Ssl » Version: 2.0.43
    cpe:2.3:a:modssl:mod_ssl:2.0.43
  • Modssl » Mod Ssl » Version: 2.0.44
    cpe:2.3:a:modssl:mod_ssl:2.0.44
  • Modssl » Mod Ssl » Version: 2.0.45
    cpe:2.3:a:modssl:mod_ssl:2.0.45
  • Modssl » Mod Ssl » Version: 2.0.47
    cpe:2.3:a:modssl:mod_ssl:2.0.47
  • Modssl » Mod Ssl » Version: 2.0.48
    cpe:2.3:a:modssl:mod_ssl:2.0.48
  • Modssl » Mod Ssl » Version: 2.0.49
    cpe:2.3:a:modssl:mod_ssl:2.0.49
  • Modssl » Mod Ssl » Version: 2.0.50
    cpe:2.3:a:modssl:mod_ssl:2.0.50
  • Modssl » Mod Ssl » Version: 2.0.51
    cpe:2.3:a:modssl:mod_ssl:2.0.51
  • Modssl » Mod Ssl » Version: 2.0.52
    cpe:2.3:a:modssl:mod_ssl:2.0.52
  • Modssl » Mod Ssl » Version: 2.0.53
    cpe:2.3:a:modssl:mod_ssl:2.0.53
  • Modssl » Mod Ssl » Version: 2.0.54
    cpe:2.3:a:modssl:mod_ssl:2.0.54
  • Modssl » Mod Ssl » Version: 2.0.55
    cpe:2.3:a:modssl:mod_ssl:2.0.55
  • Modssl » Mod Ssl » Version: 2.0.58
    cpe:2.3:a:modssl:mod_ssl:2.0.58
  • Modssl » Mod Ssl » Version: 2.0.59
    cpe:2.3:a:modssl:mod_ssl:2.0.59
  • Modssl » Mod Ssl » Version: 2.1.9
    cpe:2.3:a:modssl:mod_ssl:2.1.9
  • Modssl » Mod Ssl » Version: 2.2.0
    cpe:2.3:a:modssl:mod_ssl:2.2.0
  • Modssl » Mod Ssl » Version: 2.2.2
    cpe:2.3:a:modssl:mod_ssl:2.2.2
  • Modssl » Mod Ssl » Version: 2.2.3
    cpe:2.3:a:modssl:mod_ssl:2.2.3
  • Modssl » Mod Ssl » Version: 2.2.4
    cpe:2.3:a:modssl:mod_ssl:2.2.4
  • Modssl » Mod Ssl » Version: 2.3.5
    cpe:2.3:a:modssl:mod_ssl:2.3.5
  • Modssl » Mod Ssl » Version: 2.4.1
    cpe:2.3:a:modssl:mod_ssl:2.4.1
  • Modssl » Mod Ssl » Version: 2.4.5
    cpe:2.3:a:modssl:mod_ssl:2.4.5
  • Modssl » Mod Ssl » Version: 2.6.4
    cpe:2.3:a:modssl:mod_ssl:2.6.4
  • Modssl » Mod Ssl » Version: 2.6.6
    cpe:2.3:a:modssl:mod_ssl:2.6.6
  • Modssl » Mod Ssl » Version: 2.7.1
    cpe:2.3:a:modssl:mod_ssl:2.7.1
  • Modssl » Mod Ssl » Version: 2.7.2
    cpe:2.3:a:modssl:mod_ssl:2.7.2
  • Modssl » Mod Ssl » Version: 2.8.0
    cpe:2.3:a:modssl:mod_ssl:2.8.0
  • Modssl » Mod Ssl » Version: 2.8.1
    cpe:2.3:a:modssl:mod_ssl:2.8.1
  • Modssl » Mod Ssl » Version: 2.8.2
    cpe:2.3:a:modssl:mod_ssl:2.8.2
  • Modssl » Mod Ssl » Version: 2.8.3
    cpe:2.3:a:modssl:mod_ssl:2.8.3
  • Modssl » Mod Ssl » Version: 2.8.4
    cpe:2.3:a:modssl:mod_ssl:2.8.4
  • Modssl » Mod Ssl » Version: 2.8.5
    cpe:2.3:a:modssl:mod_ssl:2.8.5
  • Modssl » Mod Ssl » Version: 2.8.7
    cpe:2.3:a:modssl:mod_ssl:2.8.7
  • Modssl » Mod Ssl » Version: 2.8.8
    cpe:2.3:a:modssl:mod_ssl:2.8.8
  • Modssl » Mod Ssl » Version: 2.8.9
    cpe:2.3:a:modssl:mod_ssl:2.8.9


Contact Us

Shodan ® - All rights reserved