CVE-2007-0009
Vulnerability Summary
Timeline
Description
Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
CVSS Metrics
- v2.0•MEDIUM•Score: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 49.54%• Percentile: 98%
Techniques & Countermeasures
- CWE-119•Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Affected Systems
- canonical•ubuntu_linux
5.10 | 6.06 | 6.10
- debian•debian_linux
3.1 | 4.0
- Unknown•Firefox
≥ 1.5, < 1.5.0.10 | ≥ 2.0, < 2.0.0.2
- mozilla•network security services
< 3.11.5
- mozilla•seamonkey
< 1.0.8
- mozilla•thunderbird
< 1.5.0.10
References (66)
- http://www.redhat.com/support/errata/RHSA-2007-0078.html
- http://secunia.com/advisories/24562
- http://secunia.com/advisories/25597
- http://www.gentoo.org/security/en/glsa/glsa-200703-22.xml
- http://fedoranews.org/cms/node/2709
- http://secunia.com/advisories/24703
- http://secunia.com/advisories/24395
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483
- http://www.securityfocus.com/archive/1/461336/100/0/threaded
- http://fedoranews.org/cms/node/2747
- http://www.redhat.com/support/errata/RHSA-2007-0108.html
- http://secunia.com/advisories/24277
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
- http://secunia.com/advisories/24384
- http://secunia.com/advisories/24406
- http://secunia.com/advisories/24457
- http://secunia.com/advisories/24253
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
- http://secunia.com/advisories/24343
- http://www.debian.org/security/2007/dsa-1336
- http://www.kb.cert.org/vuls/id/592796
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
- http://www.vupen.com/english/advisories/2007/1165
- http://www.securitytracker.com/id?1017696
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102945-1
- http://www.vupen.com/english/advisories/2007/0718
- http://fedoranews.org/cms/node/2711
- http://fedoranews.org/cms/node/2749
- http://security.gentoo.org/glsa/glsa-200703-18.xml
- http://secunia.com/advisories/24650
- http://www.ubuntu.com/usn/usn-428-1
- http://secunia.com/advisories/25588
- https://issues.rpath.com/browse/RPL-1103
- http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
- http://www.securityfocus.com/archive/1/461809/100/0/threaded
- http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
- http://secunia.com/advisories/24293
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
- http://secunia.com/advisories/24456
- http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
- http://secunia.com/advisories/24342
- http://secunia.com/advisories/24287
- http://secunia.com/advisories/24522
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102856-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=364323
- http://www.vupen.com/english/advisories/2007/0719
- http://www.ubuntu.com/usn/usn-431-1
- http://www.redhat.com/support/errata/RHSA-2007-0097.html
- ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10174
- http://secunia.com/advisories/24389
- https://issues.rpath.com/browse/RPL-1081
- http://secunia.com/advisories/24410
- http://www.osvdb.org/32106
- http://secunia.com/advisories/24333
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32663
- http://www.vupen.com/english/advisories/2007/2141
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
- http://www.securityfocus.com/bid/64758
- http://secunia.com/advisories/24290
- http://secunia.com/advisories/24455
- http://rhn.redhat.com/errata/RHSA-2007-0077.html
- ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
- http://www.redhat.com/support/errata/RHSA-2007-0079.html