OpenSSL < 0.9.7-beta3 Buffer Overflow

high Nessus Plugin ID 17752


The remote server is affected by an arbitrary code execution vulnerability.


According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.7-beta3.

If Kerberos is enabled, a remote attacker could trigger a buffer overflow with a long master key and execute arbitrary code.


Upgrade to OpenSSL 0.9.7 or later.

Plugin Details

Severity: High

ID: 17752

File Name: openssl_0_9_7_beta3.nasl

Version: 1.11

Type: remote

Family: Web Servers

Published: 1/4/2012

Updated: 7/16/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Ease: No known exploits are available

Patch Publication Date: 12/31/2002

Vulnerability Publication Date: 7/30/2002

Reference Information

CVE: CVE-2002-0657

BID: 5361

CERT: 561275

CERT-CC: CA-2002-23