Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> OpenSSL overflow via invalid certificate passing


Vulnerability Assessment Details

OpenSSL overflow via invalid certificate passing

Vulnerability Assessment Summary
Checks for the behavior of SSL

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote host is vulnerable to a heap corruption vulnerability.

Description :

The remote host seems to be running a version of OpenSSL which is older
than 0.9.6k or 0.9.7c.

There is a heap corruption bug in this version which might be exploited by an
attacker to execute arbitrary code on the remote host with the rights
of the remote service.

Solution :

If you are running OpenSSL, upgrade to version 0.9.6k or 0.9.7c or newer.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 8732, 13359

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Tenable Network Security

Cables, Connectors

TOSHIBA THNSNS128GMCP mSATA 128 GB Laptop Solid State Drive
$40.23
TOSHIBA THNSNS128GMCP mSATA 128 GB Laptop Solid State Drive pictureSabrent USB 3.0 4 Bay 2.5” Hard drive/SSD Docking Station with Fan DS-4SSD
$67.06
Sabrent USB 3.0 4 Bay 2.5” Hard drive/SSD Docking Station with Fan DS-4SSD pictureTESTED OEM - Toshiba 256GB mSATA SSD Solid State Hard Drive SSD - THNSNJ256GMCU
$72.35
TESTED OEM - Toshiba 256GB mSATA SSD Solid State Hard Drive SSD - THNSNJ256GMCU picturenew SSD UV400 2.5" 120GB SATA III TLC Internal Solid State Drive For Kingston qq
$19.87
new SSD UV400 2.5


Discussions

No Discussions have been posted on this vulnerability.