Netscape NSS Library SSLv2 Challenge Overflow

High Nessus Plugin ID 14361


The remote service is susceptible to a buffer overflow attack.


The remote host seems to be using the Mozilla Network Security Services (NSS) Library, a set of libraries designed to support the development of security-enabled client/server applications.

There seems to be a flaw in the remote version of this library, in the SSLv2 handling code, that may allow an attacker to cause a heap overflow and therefore execute arbitrary commands on the remote host.
To exploit this flaw, an attacker needs to send a malformed SSLv2 'hello' message to the remote service.


Upgrade the remote service to use NSS 3.9.2 or newer.

See Also

Plugin Details

Severity: High

ID: 14361

File Name: sslv2_hello_overflow.nasl

Version: 1.22

Type: remote

Published: 2004/08/24

Modified: 2013/10/18

Dependencies: 56984

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SSL/Supported

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2004/08/23

Exploitable With


Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015

OSVDB: 9116