Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58160
Category:Gentoo Local Security Checks
Title:Gentoo Security Advisory GLSA 200703-22 (nss)
Summary:The remote host is missing updates announced in;advisory GLSA 200703-22.
Description:Summary:
The remote host is missing updates announced in
advisory GLSA 200703-22.

Vulnerability Insight:
The Mozilla Network Security Services libraries are vulnerable to two
buffer overflows that could result in the remote execution of arbitrary
code.

Solution:
All NSS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-libs/nss-3.11.5'

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-0008
1017696
http://www.securitytracker.com/id?1017696
102856
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102856-1
102945
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102945-1
20070202-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
20070223 Mozilla Network Security Services SSLv2 Client Integer Underflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482
20070226 rPSA-2007-0040-1 firefox
http://www.securityfocus.com/archive/1/461336/100/0/threaded
20070301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
20070303 rPSA-2007-0040-3 firefox thunderbird
http://www.securityfocus.com/archive/1/461809/100/0/threaded
22694
http://www.securityfocus.com/bid/22694
24205
http://secunia.com/advisories/24205
24238
http://secunia.com/advisories/24238
24252
http://secunia.com/advisories/24252
24253
http://secunia.com/advisories/24253
24277
http://secunia.com/advisories/24277
24287
http://secunia.com/advisories/24287
24290
http://secunia.com/advisories/24290
24293
http://secunia.com/advisories/24293
24320
http://secunia.com/advisories/24320
24328
http://secunia.com/advisories/24328
24333
http://secunia.com/advisories/24333
24342
http://secunia.com/advisories/24342
24343
http://secunia.com/advisories/24343
24384
http://secunia.com/advisories/24384
24389
http://secunia.com/advisories/24389
24395
http://secunia.com/advisories/24395
24406
http://secunia.com/advisories/24406
24410
http://secunia.com/advisories/24410
24455
http://secunia.com/advisories/24455
24456
http://secunia.com/advisories/24456
24457
http://secunia.com/advisories/24457
24522
http://secunia.com/advisories/24522
24562
http://secunia.com/advisories/24562
24650
http://secunia.com/advisories/24650
24703
http://secunia.com/advisories/24703
25588
http://secunia.com/advisories/25588
25597
http://secunia.com/advisories/25597
32105
http://www.osvdb.org/32105
64758
http://www.securityfocus.com/bid/64758
ADV-2007-0718
http://www.vupen.com/english/advisories/2007/0718
ADV-2007-0719
http://www.vupen.com/english/advisories/2007/0719
ADV-2007-1165
http://www.vupen.com/english/advisories/2007/1165
ADV-2007-2141
http://www.vupen.com/english/advisories/2007/2141
DSA-1336
http://www.debian.org/security/2007/dsa-1336
FEDORA-2007-278
http://fedoranews.org/cms/node/2709
FEDORA-2007-279
http://fedoranews.org/cms/node/2711
FEDORA-2007-281
http://fedoranews.org/cms/node/2713
FEDORA-2007-293
http://fedoranews.org/cms/node/2728
FEDORA-2007-308
http://fedoranews.org/cms/node/2747
FEDORA-2007-309
http://fedoranews.org/cms/node/2749
GLSA-200703-18
http://security.gentoo.org/glsa/glsa-200703-18.xml
GLSA-200703-22
http://www.gentoo.org/security/en/glsa/glsa-200703-22.xml
HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
MDKSA-2007:050
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
MDKSA-2007:052
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
RHSA-2007:0077
http://rhn.redhat.com/errata/RHSA-2007-0077.html
RHSA-2007:0078
http://www.redhat.com/support/errata/RHSA-2007-0078.html
RHSA-2007:0079
http://www.redhat.com/support/errata/RHSA-2007-0079.html
RHSA-2007:0097
http://www.redhat.com/support/errata/RHSA-2007-0097.html
RHSA-2007:0108
http://www.redhat.com/support/errata/RHSA-2007-0108.html
SSA:2007-066-03
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
SSA:2007-066-04
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
SSA:2007-066-05
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
SSRT061181
SUSE-SA:2007:019
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
SUSE-SA:2007:022
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
USN-428-1
http://www.ubuntu.com/usn/usn-428-1
USN-431-1
http://www.ubuntu.com/usn/usn-431-1
VU#377812
http://www.kb.cert.org/vuls/id/377812
http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
https://bugzilla.mozilla.org/show_bug.cgi?id=364319
https://issues.rpath.com/browse/RPL-1081
https://issues.rpath.com/browse/RPL-1103
nss-mastersecret-bo(32666)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32666
oval:org.mitre.oval:def:10502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10502
Common Vulnerability Exposure (CVE) ID: CVE-2007-0009
20070223 Mozilla Network Security Services SSLv2 Server Stack Overflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483
32106
http://www.osvdb.org/32106
VU#592796
http://www.kb.cert.org/vuls/id/592796
https://bugzilla.mozilla.org/show_bug.cgi?id=364323
nss-clientmasterkey-bo(32663)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32663
oval:org.mitre.oval:def:10174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10174
CopyrightCopyright (C) 2008 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.