Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> OpenSSL overflow via invalid certificate passing


Vulnerability Assessment Details

OpenSSL overflow via invalid certificate passing

Vulnerability Assessment Summary
Checks for the behavior of SSL

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote host is vulnerable to a heap corruption vulnerability.

Description :

The remote host seems to be running a version of OpenSSL which is older
than 0.9.6k or 0.9.7c.

There is a heap corruption bug in this version which might be exploited by an
attacker to execute arbitrary code on the remote host with the rights
of the remote service.

Solution :

If you are running OpenSSL, upgrade to version 0.9.6k or 0.9.7c or newer.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 8732, 13359

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Tenable Network Security

Cables, Connectors

X99-E8I Processor Computer Motherboard DDR4 Memory LGA 2011V3V4 Motherboard USA
$197.88
X99-E8I Processor Computer Motherboard DDR4 Memory LGA 2011V3V4 Motherboard USA pictureNEW ASUS ROG MAXIMUS XIII APEX Motherboard CPU SOCKET LGA1200 Intel DDR4 WiFi 6E
$633.9
NEW ASUS ROG MAXIMUS XIII APEX Motherboard CPU SOCKET LGA1200 Intel DDR4 WiFi 6E picturemotherboard cpu combo
$25.4
motherboard cpu combo pictureHP PAVILION DV7-61 DV7T-61 INTEL SOCKET RPGA989 LAPTOP MOTHERBOARD 656292-001
$59.99
HP PAVILION DV7-61 DV7T-61 INTEL SOCKET RPGA989 LAPTOP MOTHERBOARD 656292-001 picture


Discussions

No Discussions have been posted on this vulnerability.