Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2007-0008
Description:Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
Test IDs: 1.3.6.1.4.1.25623.1.0.58468  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2007-0008
1017696
http://www.securitytracker.com/id?1017696
102856
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102856-1
102945
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102945-1
20070202-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
20070223 Mozilla Network Security Services SSLv2 Client Integer Underflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482
20070226 rPSA-2007-0040-1 firefox
http://www.securityfocus.com/archive/1/461336/100/0/threaded
20070301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
20070303 rPSA-2007-0040-3 firefox thunderbird
http://www.securityfocus.com/archive/1/461809/100/0/threaded
22694
http://www.securityfocus.com/bid/22694
24205
http://secunia.com/advisories/24205
24238
http://secunia.com/advisories/24238
24252
http://secunia.com/advisories/24252
24253
http://secunia.com/advisories/24253
24277
http://secunia.com/advisories/24277
24287
http://secunia.com/advisories/24287
24290
http://secunia.com/advisories/24290
24293
http://secunia.com/advisories/24293
24320
http://secunia.com/advisories/24320
24328
http://secunia.com/advisories/24328
24333
http://secunia.com/advisories/24333
24342
http://secunia.com/advisories/24342
24343
http://secunia.com/advisories/24343
24384
http://secunia.com/advisories/24384
24389
http://secunia.com/advisories/24389
24395
http://secunia.com/advisories/24395
24406
http://secunia.com/advisories/24406
24410
http://secunia.com/advisories/24410
24455
http://secunia.com/advisories/24455
24456
http://secunia.com/advisories/24456
24457
http://secunia.com/advisories/24457
24522
http://secunia.com/advisories/24522
24562
http://secunia.com/advisories/24562
24650
http://secunia.com/advisories/24650
24703
http://secunia.com/advisories/24703
25588
http://secunia.com/advisories/25588
25597
http://secunia.com/advisories/25597
32105
http://www.osvdb.org/32105
64758
http://www.securityfocus.com/bid/64758
ADV-2007-0718
http://www.vupen.com/english/advisories/2007/0718
ADV-2007-0719
http://www.vupen.com/english/advisories/2007/0719
ADV-2007-1165
http://www.vupen.com/english/advisories/2007/1165
ADV-2007-2141
http://www.vupen.com/english/advisories/2007/2141
DSA-1336
http://www.debian.org/security/2007/dsa-1336
FEDORA-2007-278
http://fedoranews.org/cms/node/2709
FEDORA-2007-279
http://fedoranews.org/cms/node/2711
FEDORA-2007-281
http://fedoranews.org/cms/node/2713
FEDORA-2007-293
http://fedoranews.org/cms/node/2728
FEDORA-2007-308
http://fedoranews.org/cms/node/2747
FEDORA-2007-309
http://fedoranews.org/cms/node/2749
GLSA-200703-18
http://security.gentoo.org/glsa/glsa-200703-18.xml
GLSA-200703-22
http://www.gentoo.org/security/en/glsa/glsa-200703-22.xml
HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
MDKSA-2007:050
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
MDKSA-2007:052
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
RHSA-2007:0077
http://rhn.redhat.com/errata/RHSA-2007-0077.html
RHSA-2007:0078
http://www.redhat.com/support/errata/RHSA-2007-0078.html
RHSA-2007:0079
http://www.redhat.com/support/errata/RHSA-2007-0079.html
RHSA-2007:0097
http://www.redhat.com/support/errata/RHSA-2007-0097.html
RHSA-2007:0108
http://www.redhat.com/support/errata/RHSA-2007-0108.html
SSA:2007-066-03
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
SSA:2007-066-04
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
SSA:2007-066-05
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
SSRT061181
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
SUSE-SA:2007:019
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
SUSE-SA:2007:022
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
USN-428-1
http://www.ubuntu.com/usn/usn-428-1
USN-431-1
http://www.ubuntu.com/usn/usn-431-1
VU#377812
http://www.kb.cert.org/vuls/id/377812
http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
https://bugzilla.mozilla.org/show_bug.cgi?id=364319
https://bugzilla.mozilla.org/show_bug.cgi?id=364319
https://issues.rpath.com/browse/RPL-1081
https://issues.rpath.com/browse/RPL-1081
https://issues.rpath.com/browse/RPL-1103
https://issues.rpath.com/browse/RPL-1103
nss-mastersecret-bo(32666)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32666
oval:org.mitre.oval:def:10502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10502




© 1998-2025 E-Soft Inc. All rights reserved.