SUBJECT: Mitigation Instructions for CVE-2002-0657: Buffer Overflow in OpenSSL versions 0.9.7-beta1 and 0.9.7-beta2
TECH STACK: Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos enabled
DATE(S) ISSUED: 08/12/2002
NVD Last Modified: 09/10/2008
CRITICALITY: 7.5 HIGH
OVERVIEW: CVE-2002-0657 is a critical vulnerability in OpenSSL versions 0.9.7-beta1 and 0.9.7-beta2. This vulnerability allows remote attackers with Kerberos enabled to execute arbitrary code on affected systems via a buffer overflow in the handling of long master keys.
SOLUTION/MITIGATION:
The recommended solution to mitigate this vulnerability is to upgrade to a non-vulnerable version of OpenSSL. You can find the latest version and download instructions on the OpenSSL website: https://www.openssl.org/source/.
Here are the specific steps to take:
Download and install the latest non-vulnerable version of OpenSSL: Follow the instructions provided on the OpenSSL website.
Restart any services that rely on OpenSSL: This ensures that the changes take effect.
Confirmation & Additional Information:
REFERENCES