Skip the navigation

ISS: Critical Netscape flaw could be widespread

The vulnerability could make Web servers vulnerable to attack

By Paul Roberts
August 24, 2004 12:00 PM ET

IDG News Service - Security company Internet Security Systems Inc. (ISS) is warning its customers about a critical security hole in a commonly used technology from the Mozilla Foundation called the Netscape Network Security Services (NSS) library that could make Web servers vulnerable to remote attack.
Atlanta-based ISS issued a security bulletin today about a flaw in the NSS library's implementation of the Secure Sockets Layer Version 2 (SSLv2) protocol that could allow remote attackers to use an SSLv2 connection to take control of Web servers using the NSS library. The flaw affects the Netscape Enterprise Server and Sun Microsystems Inc.'s Sun Java System Web Server, but it may also affect countless other products that use the open-source NSS library, ISS said.
The problem stems from a flaw in the way the NSS library handles requests for new SSLv2 sessions. Servers using the NSS library don't check the length of a record field in the first part of the negotiation between two systems attempting to establish an SSLv2 session. Malicious hackers could use the absence of that length check in the first record sent in the negotiation, known as the "hello message," to cause a heap overflow, allowing them to place and run malicious code on a vulnerable server, ISS said.
In heap overflows, an area of a vulnerable computer's memory that's allocated for use by a software program is exceeded by a piece of data that's larger than the allocated space, causing adjacent areas of memory on the system to be overwritten with arbitrary data or malicious code sent by the attacker.
If successfully exploited, the NSS library vulnerability gives a remote attacker access to the vulnerable system with the same level of privileges as those given to the Web server. On Microsoft Windows systems, Web servers typically have full system privileges, ISS said.
While SSLv2 protocol support is disabled on the Netscape Enterprise Server and Java System Web Server, SSLv2 is a commonly used protocol for sending sensitive information over the Internet, and many installations may have the support for SSLv2 enabled, ISS said.
In addition to the Sun Java System Web Server and Netscape Enterprise Server, the flaw affects the Netscape Personalization Engine, Netscape Director Server and Netscape Certificate Management Server, the company said.
The Mozilla Foundation in Mountain View, Calif., issued a patch for the NSS library that fixes the SSLv2 hole. Alternatively, Netscape Enterprise users can disable the SSLv2 protocol, ISS said.

Reprinted with permission from Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!