Description
Buffer overflow in the SSLv2 support in Zeus Web Server before 4.3r5 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in an invalid Client Hello message.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Intevydis · pythondosmultiple
https://www.exploit-db.com/exploits/33531
References (9)
Core 9
Core References
Various Sources x_refsource_confirm
http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released
Various Sources x_refsource_misc
http://intevydis.com/vd-list.shtml
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0147
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/61699
Vendor Advisory x_refsource_confirm
http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1023465
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/37829
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38056
Exploit x_refsource_misc
http://intevydis.blogspot.com/2010/01/zeus-web-server-ssl2clienthello.html
Scores
EPSS
0.3962
EPSS Percentile
97.3%
Details
CWE
CWE-119
Status
published
Products (1)
zeus/zeus_web_server
4.3r5
Published
Jan 20, 2010
Tracked Since
Feb 18, 2026