Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
2007-02-26T20:28:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | < 1.5.0.10 | Yes |
Application | mozilla | firefox | < 2.0.0.2 | Yes |
Application | mozilla | network_security_services | < 3.11.5 | Yes |
Application | mozilla | seamonkey | < 1.0.8 | Yes |
Application | mozilla | thunderbird | < 1.5.0.10 | Yes |
Operating System | debian | debian_linux | 3.1 | Yes |
Operating System | debian | debian_linux | 4.0 | Yes |
Operating System | canonical | ubuntu_linux | 5.10 | Yes |
Operating System | canonical | ubuntu_linux | 6.06 | Yes |
Operating System | canonical | ubuntu_linux | 6.10 | Yes |