libNSS Hello Challenge Remote Heap Overflow

high Nessus Network Monitor Plugin ID 2134

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host seems to be running a vulnerable version of the Netscape Enterprise Server, iPlanet or Sun ONE Web Server. This version is based on a vulnerable version of libNSS, the Network Security Service library that implements the SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello' message. An attacker may use this overflow to execute arbitrary code on the remote host.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: High

ID: 2134

Family: Web Servers

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015