Description
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
Remediation
References
Related Vulnerabilities
Jenkins Deserialization of Untrusted Data Vulnerability (CVE-2022-0538)
WordPress Plugin WebHotelier for WordPress Cross-Site Scripting (1.5)
WordPress Plugin Adminer Security Bypass (1.4.5)
Django Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2025-32873)
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-1607)