CVE-2004-0826

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*
cpe:2.3:a:netscape:certificate_server:4.2:*:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:4.1:*:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:4.11:*:*:*:*:*:*:*
cpe:2.3:a:netscape:directory_server:4.13:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:2.0.1c:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.0.7a:*:netware:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.0l:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.2:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.3:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.4:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.5:*:solaris:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.6:*:solaris:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.6:sp1:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:3.6:sp3:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp3:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp4:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp5:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp6:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp7:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1:sp8:*:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:4.1.1:*:netware:*:*:*:*:*
cpe:2.3:a:netscape:enterprise_server:5.0:*:netware:*:*:*:*:*
cpe:2.3:a:netscape:personalization_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_enterprise_system:2003q4:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_enterprise_system:2004q2:*:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.0:ur4:*:*:*:*:*:*
cpe:2.3:a:sun:java_system_application_server:7.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:one_application_server:6.0:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp14:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.0:sp7:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.0:sp8:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109351293827731&w=2 - () http://marc.info/?l=bugtraq&m=109351293827731&w=2 -
References () http://www.securityfocus.com/bid/11015 - Patch () http://www.securityfocus.com/bid/11015 - Patch
References () http://xforce.iss.net/xforce/alerts/id/180 - Patch, Vendor Advisory () http://xforce.iss.net/xforce/alerts/id/180 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0826

Mitre link : CVE-2004-0826

CVE.ORG link : CVE-2004-0826


JSON object : View

Products Affected

mozilla

  • network_security_services

netscape

  • enterprise_server
  • certificate_server
  • directory_server
  • personalization_engine

sun

  • java_system_application_server
  • java_enterprise_system
  • one_application_server
  • one_web_server

hp

  • hp-ux