libNSS Hello Challenge Remote Heap Overflow

high Nessus Network Monitor Plugin ID 2133

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running a vulnerable version of the Mozilla web browser. This version is based on a vulnerable version of libNSS, the Network Security Service library that implements the SSL/TLS protocol. It is reported that versions of libNSS up to 3.9.0 are prone to a remote heap overflow in the processing of the 'hello' message. An attacker may use this overflow to execute arbitrary code on the remote host.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: High

ID: 2133

Family: Web Clients

Published: 8/18/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:network_security_services

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2004-0826

BID: 11015