Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1336-1 | New mozilla-firefox packages fix several vulnerabilities |
Ubuntu USN |
USN-428-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-431-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T12:03:36.997Z
Reserved: 2006-12-19T00:00:00
Link: CVE-2007-0009
No data.
Status : Deferred
Published: 2007-02-26T20:28:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-0009
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN