Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> OpenSSL overflow via invalid certificate passing


Vulnerability Assessment Details

OpenSSL overflow via invalid certificate passing

Vulnerability Assessment Summary
Checks for the behavior of SSL

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote host is vulnerable to a heap corruption vulnerability.

Description :

The remote host seems to be running a version of OpenSSL which is older
than 0.9.6k or 0.9.7c.

There is a heap corruption bug in this version which might be exploited by an
attacker to execute arbitrary code on the remote host with the rights
of the remote service.

Solution :

If you are running OpenSSL, upgrade to version 0.9.6k or 0.9.7c or newer.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 8732, 13359

Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2006 Tenable Network Security

Cables, Connectors

x1 Kingston A400 SSD 120GB SATA III 2.5 Internal Solid State Drive SA400S37/120G
$39.99
x1 Kingston A400 SSD 120GB SATA III 2.5 Internal Solid State Drive SA400S37/120G picture3Pcs SATA 3.0 III SATAiii 6Gb/s Data Cable Wire 16" 42cm for HDD Hard Drive SSD
$2.09
3Pcs SATA 3.0 III SATAiii 6Gb/s Data Cable Wire 16Micron S600DC S630DC 400 GB 2.5" Internal Solid State Drive - SAS
$508.99
Micron S600DC S630DC 400 GB 2.5Sonnet Fusion 1 TB External Solid State Drive - PCI Express - Portable - Thunder
$890.99
Sonnet Fusion 1 TB External Solid State Drive - PCI Express - Portable - Thunder picture


Discussions

No Discussions have been posted on this vulnerability.