First published: Mon Feb 26 2007(Updated: )
Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=1.5<1.5.0.10 | |
Mozilla Firefox | >=2.0<2.0.0.2 | |
Mozilla Network Security Services | <3.11.5 | |
Mozilla SeaMonkey | <1.0.8 | |
Mozilla Thunderbird | <1.5.0.10 | |
Debian Debian Linux | =3.1 | |
Debian Debian Linux | =4.0 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =6.10 | |
Canonical Ubuntu Linux | =5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.