ISS: Critical Netscape flaw could be widespread
The vulnerability could make Web servers vulnerable to attack
IDG News Service - Security company Internet Security Systems Inc. (ISS) is warning its customers about a critical security hole in a commonly used technology from the Mozilla Foundation called the Netscape Network Security Services (NSS) library that could make Web servers vulnerable to remote attack.
Atlanta-based ISS issued a security bulletin today about a flaw in the NSS library's implementation of the Secure Sockets Layer Version 2 (SSLv2) protocol that could allow remote attackers to use an SSLv2 connection to take control of Web servers using the NSS library. The flaw affects the Netscape Enterprise Server and Sun Microsystems Inc.'s Sun Java System Web Server, but it may also affect countless other products that use the open-source NSS library, ISS said.
The problem stems from a flaw in the way the NSS library handles requests for new SSLv2 sessions. Servers using the NSS library don't check the length of a record field in the first part of the negotiation between two systems attempting to establish an SSLv2 session. Malicious hackers could use the absence of that length check in the first record sent in the negotiation, known as the "hello message," to cause a heap overflow, allowing them to place and run malicious code on a vulnerable server, ISS said.
In heap overflows, an area of a vulnerable computer's memory that's allocated for use by a software program is exceeded by a piece of data that's larger than the allocated space, causing adjacent areas of memory on the system to be overwritten with arbitrary data or malicious code sent by the attacker.
If successfully exploited, the NSS library vulnerability gives a remote attacker access to the vulnerable system with the same level of privileges as those given to the Web server. On Microsoft Windows systems, Web servers typically have full system privileges, ISS said.
While SSLv2 protocol support is disabled on the Netscape Enterprise Server and Java System Web Server, SSLv2 is a commonly used protocol for sending sensitive information over the Internet, and many installations may have the support for SSLv2 enabled, ISS said.
In addition to the Sun Java System Web Server and Netscape Enterprise Server, the flaw affects the Netscape Personalization Engine, Netscape Director Server and Netscape Certificate Management Server, the company said.
The Mozilla Foundation in Mountain View, Calif., issued a patch for the NSS library that fixes the SSLv2 hole. Alternatively, Netscape Enterprise users can disable the SSLv2 protocol, ISS said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts