header-logo
Suggest Exploit
vendor:
ssldump
by:
Eric Rescorla
7.5
CVSS
HIGH
Format String Vulnerability
134
CWE
Product Name: ssldump
Affected Version From: 0.9b1
Affected Version To: 0.9b1
Patch Exists: YES
Related CWE: CVE-2001-0333
CPE: o:eric_rescorla:ssldump
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2001

Format String Vulnerability

ssldump is a traffic analyzer for monitoring network traffic in real time. It is written and maintained by Eric Rescorla. A problem exists which could allow the arbitrary execution of code. The problem exists in the ssldump handling of format strings. ssldump requires elevated privileges to listen to traffic crossing the network interface. While monitoring traffic, the encounter of format strings in a URL will cause the program to segmentation fault. Potentially, this could lead to the overwriting of stack variables and arbitrary execution of code with administrative access, if exploited by a malicious user. An attacker can exploit this vulnerability by running SSLDUMP, opening up Netscape Navigator, and typing in the string "fixme:%s%s%s%s%s%s" into the browser. This will cause ssldump to gather the traffic and then segmentation fault.

Mitigation:

Users should upgrade to the latest version of ssldump.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2096/info

ssldump is a traffic analyzer for monitoring network traffic in real time. It is written and maintained by Eric Rescorla. A problem exists which could allow the arbitrary execution of code.

The problem exists in the ssldump handling of format strings. ssldump requires elevated privileges to listen to traffic crossing the network interface. While monitoring traffic, the encounter of format strings in a URL will cause the program to segmentation fault. Potentially, this could lead to the overwriting of stack variables and arbitrary execution of code with administrative access, if exploited by a malicious user. 

1) Run SSLDUMP (needs you to be root unless setuid)

2)Open Up Netscape Navigator it)

3) Type the following in Netscape Navigator: fixme:%s%s%s%s%s%s

4) watch as ssldump with gather the traffic then segfault..