libNSS Hello Challenge Remote Heap Overflow

High Nessus Network Monitor Plugin ID 2133


The remote host is vulnerable to a buffer overflow.


The remote host is running a vulnerable version of the Mozilla web browser. This version is based on a vulnerable version of libNSS, the Network Security Service library that implements the SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello' message. An attacker may use this overflow to execute arbitrary code on the remote host.


Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: High

ID: 2133

File Name: 2133.prm

Family: Web Clients

Published: 2004/08/18

Modified: 2016/12/12

Dependencies: 1735, 8314

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 8.4

Temporal Score: 7.8


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With


Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015