First published: Mon Feb 26 2007(Updated: )
Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=1.5.0.9 | |
Mozilla Firefox | =0.1 | |
Mozilla Firefox | =0.2 | |
Mozilla Firefox | =0.3 | |
Mozilla Firefox | =0.4 | |
Mozilla Firefox | =0.5 | |
Mozilla Firefox | =0.6 | |
Mozilla Firefox | =0.6.1 | |
Mozilla Firefox | =0.7 | |
Mozilla Firefox | =0.7.1 | |
Mozilla Firefox | =0.8 | |
Mozilla Firefox | =0.9 | |
Mozilla Firefox | =0.9-rc | |
Mozilla Firefox | =0.9.1 | |
Mozilla Firefox | =0.9.2 | |
Mozilla Firefox | =0.9.3 | |
Mozilla Firefox | =0.10 | |
Mozilla Firefox | =0.10.1 | |
Mozilla Firefox | =1.0 | |
Mozilla Firefox | =1.0-preview_release | |
Mozilla Firefox | =1.0.1 | |
Mozilla Firefox | =1.0.2 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 | |
Mozilla Firefox | =1.0.7 | |
Mozilla Firefox | =1.0.8 | |
Mozilla Firefox | =1.4.1 | |
Mozilla Firefox | =1.5 | |
Mozilla Firefox | =1.5.0.1 | |
Mozilla Firefox | =1.5.0.2 | |
Mozilla Firefox | =1.5.0.3 | |
Mozilla Firefox | =1.5.0.4 | |
Mozilla Firefox | =1.5.0.5 | |
Mozilla Firefox | =1.5.0.6 | |
Mozilla Firefox | =1.5.0.7 | |
Mozilla Firefox | =1.5.0.8 | |
Mozilla Firefox | =1.5.0.10 | |
Mozilla Firefox | =1.5.0.11 | |
Mozilla Firefox | =1.5.0.12 | |
Mozilla Firefox | =2.0 | |
Mozilla Firefox | =2.0.0.1 | |
Mozilla NSS ESR | =3.11.2 | |
Mozilla NSS ESR | =3.11.3 | |
Mozilla NSS ESR | =3.11.4 | |
Mozilla SeaMonkey | <=1.0.7 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla SeaMonkey | =1.0.6 | |
Mozilla Thunderbird | <=1.5.0.9 | |
Mozilla Thunderbird | =0.1 | |
Mozilla Thunderbird | =0.2 | |
Mozilla Thunderbird | =0.3 | |
Mozilla Thunderbird | =0.4 | |
Mozilla Thunderbird | =0.5 | |
Mozilla Thunderbird | =0.6 | |
Mozilla Thunderbird | =0.7 | |
Mozilla Thunderbird | =0.7.1 | |
Mozilla Thunderbird | =0.7.2 | |
Mozilla Thunderbird | =0.7.3 | |
Mozilla Thunderbird | =0.8 | |
Mozilla Thunderbird | =0.9 | |
Mozilla Thunderbird | =1.0 | |
Mozilla Thunderbird | =1.0.1 | |
Mozilla Thunderbird | =1.0.2 | |
Mozilla Thunderbird | =1.0.3 | |
Mozilla Thunderbird | =1.0.4 | |
Mozilla Thunderbird | =1.0.5 | |
Mozilla Thunderbird | =1.0.6 | |
Mozilla Thunderbird | =1.0.7 | |
Mozilla Thunderbird | =1.0.8 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla Thunderbird | =1.5.0.1 | |
Mozilla Thunderbird | =1.5.0.2 | |
Mozilla Thunderbird | =1.5.0.3 | |
Mozilla Thunderbird | =1.5.0.4 | |
Mozilla Thunderbird | =1.5.0.5 | |
Mozilla Thunderbird | =1.5.0.6 | |
Mozilla Thunderbird | =1.5.0.7 | |
Mozilla Thunderbird | =1.5.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0008 is categorized with a high severity rating, allowing remote attackers to execute arbitrary code.
To remediate CVE-2007-0008, upgrade to the latest version of Mozilla Firefox, SeaMonkey, or Thunderbird that is not affected by this vulnerability.
CVE-2007-0008 affects various versions of Mozilla Firefox, SeaMonkey, Thunderbird, and certain versions of Sun Java System server products.
Yes, attackers can exploit CVE-2007-0008 remotely due to the presence of SSLv2 support in affected software.
CVE-2007-0008 can facilitate remote code execution attacks, potentially compromising the affected systems.