Upstream information
Description
Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.8 |
Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
- SUSE-SA:2007:019, published Tue, 06 Mar 2007 18:00:00 +0000
- SUSE-SA:2007:022, published Tue, 20 Mar 2007 11:00:00 +0000
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Server 11 SP1 |
| |
SUSE Linux Enterprise Server 11 SP2 |
| |
SUSE Linux Enterprise Server 11 SP3 |
| |
SUSE Linux Enterprise Server 11 SP4 |
| |
SUSE Linux Enterprise Software Development Kit 11 SP4 |
|