First published: Mon Feb 26 2007(Updated: )
Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=1.5<1.5.0.10 | |
Firefox | >=2.0<2.0.0.2 | |
Mozilla NSS ESR | <3.11.5 | |
Mozilla SeaMonkey | <1.0.8 | |
Thunderbird | <1.5.0.10 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0009 has been rated as critical due to the potential for remote code execution on affected systems.
To fix CVE-2007-0009, upgrade to Mozilla NSS version 3.11.5 or later and update affected applications such as Firefox and Thunderbird to the latest versions.
CVE-2007-0009 affects Mozilla Firefox before 1.5.0.10, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain versions of Mozilla NSS prior to 3.11.5.
Yes, CVE-2007-0009 can be exploited remotely by an attacker to execute arbitrary code on the affected systems.
CVE-2007-0009 is characterized as a stack-based buffer overflow vulnerability.