SSL.PCT.Overflow
Description
This indicates an attempt to exploit a buffer-overflow vulnerability in the Microsoft Secure Sockets Layer(SSL) library.
Due to inadequate input validation in the Private Communications Transport(PCT) protocol implementation of the Microsoft Secure Sockets Layer(SSL) library, a remote attacker can execute arbitrary code on a target system via a carefully constructed PCT 1.0 handshake packet.
Affected Products
Microsoft Windows NT 4.0 SP6a
Microsoft Windows 2000 SP2 through SP4
Microsoft Windows XP SP1
Microsoft Windows Server 2003
Microsoft NetMeeting
Microsoft Windows 98
Microsoft Windows ME
Impact
System compromise: Remote code execution.
Recommended Actions
Apply the appropriate patches from Microsoft or upgrade the system to the latest non-vulnerable version.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |