Oracle iPlanet Web Server 6.1.x < 6.1.21 / 7.0.x < 7.0.22 NSS Signature Handling Remote Code Injection

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by a remote code injection
vulnerability.

Description :

According to its self-reported version, the Oracle iPlanet Web Server
(formerly known as Sun Java System Web Server) running on the remote
host is 6.1.x prior to 6.1.21 or 7.0.x prior to 7.0.22. It is,
therefore, affected by a flaw in the definite_length_decoder()
function in the Network Security Services (NSS) library due to a
failure to ensure that the DER encoding of an ASN.1 length is properly
formed when handling PKCS#1 signatures. A remote attacker, by using a
long byte sequence for an encoding, can exploit this to conduct a
data-smuggling attack or inject arbitrary code.

See also :

http://www.nessus.org/u?d18c2a85
https://www.imperialviolet.org/2014/09/26/pkcs1.html

Solution :

Upgrade to Oracle iPlanet Web Server 6.1.21 / 7.0.22 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 84963 ()

Bugtraq ID: 71675

CVE ID: CVE-2014-1569

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now