FreeBSD : nss -- exploitable buffer overflow in SSLv2 protocol handler (207f8ff3-f697-11d8-81b0-000347a4fa7d)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

ISS X-Force reports that a remotely exploitable buffer overflow exists
in the Netscape Security Services (NSS) library's implementation of
SSLv2. From their advisory :

The NSS library contains a flaw in SSLv2 record parsing that may lead
to remote compromise. When parsing the first record in an SSLv2
negotiation, the client hello message, the server fails to validate
the length of a record field. As a result, it is possible for an
attacker to trigger a heap-based overflow of arbitrary length.

Note that the vulnerable NSS library is also present in Mozilla-based
browsers. However, it is not believed that browsers are affected, as
the vulnerability is present only in code used by SSLv2 *servers*.

See also :

http://xforce.iss.net/xforce/alerts/id/180
http://www.nessus.org/u?5f6aa215

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 37032 (freebsd_pkg_207f8ff3f69711d881b0000347a4fa7d.nasl)

Bugtraq ID: 11015

CVE ID: CVE-2004-0826

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now