Family: Gain a shell remotely --> Category: mixed
NSS Library SSLv2 Challenge Overflow Vulnerability Scan
Vulnerability Scan Summary
Tests for the NSS SSLv2 challenge overflow
Detailed Explanation for this Vulnerability Test
The remote host seems to be using the Mozilla Network Security Services (NSS)
Library, a set of libraries designed to support the developement of
security-enabled client/server application.
There seems to be a flaw in the remote version of this library, in the SSLv2
handling code, which may allow a possible hacker to cause a heap overflow and
therefore execute arbitrary commands on the remote host. To exploit this
flaw, a possible hacker would need to send a malformed SSLv2 'hello' message
to the remote service.
Solution : Upgrade the remote service to use NSS 3.9.2 or newer.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.