Oracle iPlanet Web Proxy Server 4.0.x < 4.0.26 NSS Signature Handling Remote Code Injection

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote proxy web server is affected by a remote code injection
vulnerability.

Description :

According to its self-reported version, the Oracle iPlanet Web Proxy
Server (formerly known as Sun Java System Web Proxy Server) installed
on the remote host is version 4.0.x prior to 4.0.26. It is, therefore,
affected by a flaw in the definite_length_decoder() function in the
Network Security Services (NSS) library due to a failure to ensure
that the DER encoding of an ASN.1 length is properly formed when
handling PKCS#1 signatures. A remote attacker, by using a long byte
sequence for an encoding, can exploit this to conduct a data-smuggling
attack or inject arbitrary code.

See also :

http://www.nessus.org/u?d18c2a85
https://www.imperialviolet.org/2014/09/26/pkcs1.html

Solution :

Upgrade to Oracle iPlanet Web Proxy Server 4.0.26 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 84962 ()

Bugtraq ID: 71675

CVE ID: CVE-2014-1569

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now