![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.14361 |
Category: | Gain a shell remotely |
Title: | NSS Library SSLv2 Challenge Overflow |
Summary: | The remote host seems to be using the Mozilla Network Security Services (NSS); Library, a set of libraries designed to support the development of security-enabled client/server application. |
Description: | Summary: The remote host seems to be using the Mozilla Network Security Services (NSS) Library, a set of libraries designed to support the development of security-enabled client/server application. Vulnerability Impact: There seems to be a flaw in the remote version of this library, in the SSLv2 handling code, which may allow an attacker to cause a heap overflow and therefore execute arbitrary commands on the remote host. To exploit this flaw, an attacker would need to send a malformed SSLv2 'hello' message to the remote service. Solution: Upgrade the remote service to use NSS 3.9.2 or newer. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0826 BugTraq ID: 11015 http://www.securityfocus.com/bid/11015 HPdes Security Advisory: SSRT4779 http://marc.info/?l=bugtraq&m=109351293827731&w=2 ISS Security Advisory: 20040823 Netscape NSS Library Remote Compromise http://xforce.iss.net/xforce/alerts/id/180 XForce ISS Database: sslv2-client-hello-overflow(16314) https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 |
Copyright | Copyright (C) 2004 Digital Defense Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |