Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T12:03:36.997Z
Reserved: 2006-12-19T00:00:00
Link: CVE-2007-0009

No data.

Status : Modified
Published: 2007-02-26T20:28:00.000
Modified: 2024-11-21T00:24:45.747
Link: CVE-2007-0009
