Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2007-02-26 20:28
Updated : 2019-10-09 22:51
NVD link : CVE-2007-0009
Mitre link : CVE-2007-0009
CVE.ORG link : CVE-2007-0009
JSON object : View
Products Affected
canonical
- ubuntu_linux
mozilla
- firefox
- thunderbird
- seamonkey
- network_security_services
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer