OpenSSL < 0.9.6e / 0.9.7b3 Multiple Remote Vulnerabilities

critical Nessus Plugin ID 11060


The remote service uses a library that is affected by a buffer overflow vulnerability.


The remote service seems to be using a version of OpenSSL that is older than 0.9.6e or 0.9.7-beta3.

Such versions are affected by a buffer overflow that may allow an attacker to execute arbitrary commands on the remote host with the privileges of the application itself.


Upgrade to OpenSSL version 0.9.6e / 0.9.7beta3 or later.

Plugin Details

Severity: Critical

ID: 11060

File Name: openssl_overflow_generic_test.nasl

Version: 1.61

Type: remote

Published: 8/5/2002

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.0


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: SSL/Supported

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/30/2002

Vulnerability Publication Date: 7/10/2001

Exploitable With


Core Impact

Reference Information

CVE: CVE-2000-0535, CVE-2001-1141, CVE-2002-0655, CVE-2002-0656, CVE-2002-0657, CVE-2002-0659

BID: 1340, 3004, 5361, 5362, 5363, 5364, 5366

SuSE: SUSE-SA:2002:033