CVE-2007-0009

Current Description

Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.

Basic Data

PublishedFebruary 26, 2007
Last ModifiedOctober 09, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-119
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMozillaFirefox********1.51.5.0.10
    2.3ApplicationMozillaFirefox********2.02.0.0.2
    2.3ApplicationMozillaNetwork Security Services********3.11.5
    2.3ApplicationMozillaSeamonkey********1.0.8
    2.3ApplicationMozillaThunderbird********1.5.0.10
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux3.1*******
    2.3OSDebianDebian Linux4.0*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSCanonicalUbuntu Linux5.10*******
    2.3OSCanonicalUbuntu Linux6.06***lts***
    2.3OSCanonicalUbuntu Linux6.10*******

Vulnerable Software List

VendorProductVersions
Mozilla Firefox *
Mozilla Thunderbird *
Mozilla Seamonkey *
Mozilla Network Security Services *
Debian Debian Linux 3.1, 4.0
Canonical Ubuntu Linux 5.10, 6.06, 6.10

References

NameSourceURLTags
20070202-01-Pftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.ascSGIBroken Link
20070301-01-Pftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.ascSGIBroken Link
FEDORA-2007-278http://fedoranews.org/cms/node/2709FEDORABroken Link
FEDORA-2007-279http://fedoranews.org/cms/node/2711FEDORABroken Link
FEDORA-2007-308http://fedoranews.org/cms/node/2747FEDORABroken Link
FEDORA-2007-309http://fedoranews.org/cms/node/2749FEDORABroken Link
HPSBUX02153http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742HPBroken Link
20070223 Mozilla Network Security Services SSLv2 Server Stack Overflow Vulnerabilityhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483IDEFENSEBroken Link
SUSE-SA:2007:019http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.htmlSUSEBroken Link
RHSA-2007:0077http://rhn.redhat.com/errata/RHSA-2007-0077.htmlREDHATThird Party Advisory
24253http://secunia.com/advisories/24253SECUNIAThird Party Advisory
24277http://secunia.com/advisories/24277SECUNIAThird Party Advisory
24287http://secunia.com/advisories/24287SECUNIAThird Party Advisory
24290http://secunia.com/advisories/24290SECUNIAThird Party Advisory
24293http://secunia.com/advisories/24293SECUNIAThird Party Advisory
24333http://secunia.com/advisories/24333SECUNIAThird Party Advisory
24342http://secunia.com/advisories/24342SECUNIAThird Party Advisory
24343http://secunia.com/advisories/24343SECUNIAThird Party Advisory
24384http://secunia.com/advisories/24384SECUNIAThird Party Advisory
24389http://secunia.com/advisories/24389SECUNIAThird Party Advisory
24395http://secunia.com/advisories/24395SECUNIAThird Party Advisory
24406http://secunia.com/advisories/24406SECUNIAThird Party Advisory
24410http://secunia.com/advisories/24410SECUNIAThird Party Advisory
24455http://secunia.com/advisories/24455SECUNIAThird Party Advisory
24456http://secunia.com/advisories/24456SECUNIAThird Party Advisory
24457http://secunia.com/advisories/24457SECUNIAThird Party Advisory
24522http://secunia.com/advisories/24522SECUNIAThird Party Advisory
24562http://secunia.com/advisories/24562SECUNIAThird Party Advisory
24650http://secunia.com/advisories/24650SECUNIAThird Party Advisory
24703http://secunia.com/advisories/24703SECUNIAThird Party Advisory
25588http://secunia.com/advisories/25588SECUNIAThird Party Advisory
25597http://secunia.com/advisories/25597SECUNIAThird Party Advisory
GLSA-200703-18http://security.gentoo.org/glsa/glsa-200703-18.xmlGENTOOThird Party Advisory
SSA:2007-066-05http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131SLACKWAREMailing List Third Party Advisory
SSA:2007-066-04http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947SLACKWAREMailing List Third Party Advisory
SSA:2007-066-03http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851SLACKWAREMailing List Third Party Advisory
102856http://sunsolve.sun.com/search/document.do?assetkey=1-26-102856-1SUNALERTBroken Link
102945http://sunsolve.sun.com/search/document.do?assetkey=1-26-102945-1SUNALERTBroken Link
DSA-1336http://www.debian.org/security/2007/dsa-1336DEBIANThird Party Advisory
GLSA-200703-22http://www.gentoo.org/security/en/glsa/glsa-200703-22.xmlGENTOOThird Party Advisory
VU#592796http://www.kb.cert.org/vuls/id/592796CERT-VNThird Party Advisory US Government Resource
MDKSA-2007:050http://www.mandriva.com/security/advisories?name=MDKSA-2007:050MANDRIVAThird Party Advisory
MDKSA-2007:052http://www.mandriva.com/security/advisories?name=MDKSA-2007:052MANDRIVAThird Party Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-06.htmlhttp://www.mozilla.org/security/announce/2007/mfsa2007-06.htmlCONFIRMVendor Advisory
SUSE-SA:2007:022http://www.novell.com/linux/security/advisories/2007_22_mozilla.htmlSUSEBroken Link
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.htmlCONFIRMThird Party Advisory
32106http://www.osvdb.org/32106OSVDBBroken Link
RHSA-2007:0078http://www.redhat.com/support/errata/RHSA-2007-0078.htmlREDHATThird Party Advisory
RHSA-2007:0079http://www.redhat.com/support/errata/RHSA-2007-0079.htmlREDHATThird Party Advisory
RHSA-2007:0097http://www.redhat.com/support/errata/RHSA-2007-0097.htmlREDHATThird Party Advisory
RHSA-2007:0108http://www.redhat.com/support/errata/RHSA-2007-0108.htmlREDHATThird Party Advisory
20070226 rPSA-2007-0040-1 firefoxhttp://www.securityfocus.com/archive/1/461336/100/0/threadedBUGTRAQThird Party Advisory VDB Entry
20070303 rPSA-2007-0040-3 firefox thunderbirdhttp://www.securityfocus.com/archive/1/461809/100/0/threadedBUGTRAQThird Party Advisory VDB Entry
64758http://www.securityfocus.com/bid/64758BIDThird Party Advisory VDB Entry
1017696http://www.securitytracker.com/id?1017696SECTRACKThird Party Advisory VDB Entry
USN-428-1http://www.ubuntu.com/usn/usn-428-1UBUNTUThird Party Advisory
USN-431-1http://www.ubuntu.com/usn/usn-431-1UBUNTUThird Party Advisory
ADV-2007-0718http://www.vupen.com/english/advisories/2007/0718VUPENThird Party Advisory
ADV-2007-0719http://www.vupen.com/english/advisories/2007/0719VUPENThird Party Advisory
ADV-2007-1165http://www.vupen.com/english/advisories/2007/1165VUPENThird Party Advisory
ADV-2007-2141http://www.vupen.com/english/advisories/2007/2141VUPENThird Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=364323https://bugzilla.mozilla.org/show_bug.cgi?id=364323MISCIssue Tracking Vendor Advisory
nss-clientmasterkey-bo(32663)https://exchange.xforce.ibmcloud.com/vulnerabilities/32663XFThird Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-1081https://issues.rpath.com/browse/RPL-1081CONFIRMBroken Link
https://issues.rpath.com/browse/RPL-1103https://issues.rpath.com/browse/RPL-1103CONFIRMBroken Link
oval:org.mitre.oval:def:10174https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10174OVALThird Party Advisory