libNSS Hello Challenge Remote Heap Overflow

High Nessus Network Monitor Plugin ID 2133

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a vulnerable version of the Mozilla web browser. This version is based on a vulnerable version of libNSS, the Network Security Service library that implements the SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello' message. An attacker may use this overflow to execute arbitrary code on the remote host.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: High

ID: 2133

File Name: 2133.prm

Family: Web Clients

Published: 2004/08/18

Modified: 2016/12/12

Dependencies: 1735, 8314

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 8.4

Temporal Score: 7.8

Vector: CVSS3#AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015