CVE-2007-0009

Deferred
Published: 26 Feb 2007, 20:00
Last modified:07 Aug 2024, 12:03

Vulnerability Summary

Overall Risk (default)
medium
37/100
CVSS Score
6.8 MEDIUM
v2.0 (nvd)
EPSS Score
49.54% HIGH
50% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

26 Feb 2007, 20:00
Published
Vulnerability first disclosed
07 Aug 2024, 12:03
Last Modified
Vulnerability information updated

Description

Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.

CVSS Metrics

  • v2.0MEDIUMScore: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 49.54% Percentile: 98%

Techniques & Countermeasures

  • CWE-119Improper Restriction of Operations within the Bounds of a Memory Buffer

    The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Affected Systems

  • canonicalubuntu_linux

    5.10 | 6.06 | 6.10

  • debiandebian_linux

    3.1 | 4.0

  • UnknownFirefox

    ≥ 1.5, < 1.5.0.10 | ≥ 2.0, < 2.0.0.2

  • mozillanetwork security services

    < 3.11.5

  • mozillaseamonkey

    < 1.0.8

  • mozillathunderbird

    < 1.5.0.10

References (66)