Vulnerability Details : CVE-2010-0359
Buffer overflow in the SSLv2 support in Zeus Web Server before 4.3r5 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in an invalid Client Hello message.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2010-0359
- cpe:2.3:a:zeus:zeus_web_server:4.3r5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0359
60.63%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0359
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-0359
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0359
-
http://intevydis.blogspot.com/2010/01/zeus-web-server-ssl2clienthello.html
intevydis security researchExploit
-
http://www.securityfocus.com/bid/37829
Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability
-
http://securitytracker.com/id?1023465
Zeus Web Server Buffer Overflow in SSL Implementation Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.vupen.com/english/advisories/2010/0147
Webmail | OVH- OVHVendor Advisory
-
http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
-
http://intevydis.com/vd-list.shtml
404 Not Found
-
http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
Vendor Advisory
Jump to