Netscape NSS Library SSLv2 Challenge Overflow

high Nessus Plugin ID 14361

Synopsis

The remote service is susceptible to a buffer overflow attack.

Description

The remote host seems to be using the Mozilla Network Security Services (NSS) Library, a set of libraries designed to support the development of security-enabled client/server applications.

There seems to be a flaw in the remote version of this library, in the SSLv2 handling code, that may allow an attacker to cause a heap overflow and therefore execute arbitrary commands on the remote host.
To exploit this flaw, an attacker needs to send a malformed SSLv2 'hello' message to the remote service.

Solution

Upgrade the remote service to use NSS 3.9.2 or newer.

See Also

http://www.nessus.org/u?844b4085

Plugin Details

Severity: High

ID: 14361

File Name: sslv2_hello_overflow.nasl

Version: 1.28

Type: remote

Published: 8/24/2004

Updated: 7/9/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2004-0826

Vulnerability Information

Required KB Items: SSL/Supported

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/23/2004

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015