All the vulnerabilites related to netscape - certificate_server
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
Impacted products
Vendor Product Version
mozilla network_security_services 3.2
mozilla network_security_services 3.2.1
mozilla network_security_services 3.3
mozilla network_security_services 3.3.1
mozilla network_security_services 3.3.2
mozilla network_security_services 3.4
mozilla network_security_services 3.4.1
mozilla network_security_services 3.4.2
mozilla network_security_services 3.5
mozilla network_security_services 3.6
mozilla network_security_services 3.6.1
mozilla network_security_services 3.7
mozilla network_security_services 3.7.1
mozilla network_security_services 3.7.2
mozilla network_security_services 3.7.3
mozilla network_security_services 3.7.5
mozilla network_security_services 3.7.7
mozilla network_security_services 3.8
mozilla network_security_services 3.9
netscape certificate_server 1.0
netscape certificate_server 4.2
netscape directory_server 1.3
netscape directory_server 3.1
netscape directory_server 3.12
netscape directory_server 4.1
netscape directory_server 4.11
netscape directory_server 4.13
netscape enterprise_server 2.0
netscape enterprise_server 2.0.1c
netscape enterprise_server 2.0a
netscape enterprise_server 3.0
netscape enterprise_server 3.0.1
netscape enterprise_server 3.0.1b
netscape enterprise_server 3.0.7a
netscape enterprise_server 3.0l
netscape enterprise_server 3.1
netscape enterprise_server 3.2
netscape enterprise_server 3.3
netscape enterprise_server 3.4
netscape enterprise_server 3.5
netscape enterprise_server 3.5
netscape enterprise_server 3.5.1
netscape enterprise_server 3.6
netscape enterprise_server 3.6
netscape enterprise_server 3.6
netscape enterprise_server 3.6
netscape enterprise_server 3.6
netscape enterprise_server 4.0
netscape enterprise_server 4.1
netscape enterprise_server 4.1
netscape enterprise_server 4.1
netscape enterprise_server 4.1
netscape enterprise_server 4.1
netscape enterprise_server 4.1
netscape enterprise_server 4.1.1
netscape enterprise_server 5.0
netscape personalization_engine *
sun java_enterprise_system 2003q4
sun java_enterprise_system 2004q2
sun java_system_application_server 7.0
sun java_system_application_server 7.0
sun java_system_application_server 7.0
sun java_system_application_server 7.0
sun java_system_application_server 7.1
sun one_application_server 6.0
sun one_application_server 6.0
sun one_application_server 6.0
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 4.1
sun one_web_server 6.0
sun one_web_server 6.0
sun one_web_server 6.0
sun one_web_server 6.0
sun one_web_server 6.0
sun one_web_server 6.1
sun one_web_server 6.1
sun one_web_server 6.1
hp hp-ux 11.00
hp hp-ux 11.11
hp hp-ux 11.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E0E1D0-F71C-4A3F-B3EE-97B299EF2AE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "47CD4C15-02C8-42F2-9AF3-E44F74DE62B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DDE473-7A61-46AD-9D3B-CA299928FD44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "046596DB-57EB-4354-A79E-B3B1D5B4DD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0755B957-CB78-4B8E-9CFE-D53389789ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "17D292FA-E062-4C52-AE0A-CA7D183D9E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E1A0EA-9E2F-407F-A72F-D5061B6CD318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B565D82B-CAB8-4512-B7B7-0402146DD2B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "68341EA6-4FF0-4F87-AC71-4EC5D648406C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91596AC-3F28-4BBD-A697-81909A5407B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57A5053-018B-468C-BC18-5140E6B5B048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2962B1B-4B7F-4527-AE4C-C76787FEDB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE921188-7A50-479F-853F-95127C9BE4E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F710939C-8598-40FE-9D5F-A3665723A5C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "75572113-BD36-49BB-B7A1-177EB7DD3AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F18265E-EE99-4D0F-B975-22A86077A611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E3EA58-3FD3-4AD8-AA63-057F8D31301B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51D3086-99CB-4C01-B286-3F7F6B6FB3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACA7EB49-52A7-4AFC-9D7D-0225A430B636",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "72E930EF-CCEC-44EA-AA45-18644EFDA5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:certificate_server:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "506D842B-339C-452A-A229-C6B59B0E038D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "492922BE-3B31-486C-94B5-114089E51E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E0FF18-9B01-4500-9599-8F085655C388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE69D422-E6FF-40F5-BC73-73BE3A042DE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "39B65825-FE48-4938-A04F-12740611681B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE13D7D-2171-44F3-84D3-4CFD024AA3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5E0298-99D9-476D-A7DF-36C6207482DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E0069EE-831B-4E6D-9AF9-71EFC9EED509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5234109F-AD90-4324-AA03-C5DE007D32F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7B9FDA-DC62-4EC9-9120-A7E6795C2815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "60812728-EC82-461E-BBDC-C5B4C1BF79E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94D2CA3-9868-4F27-B31D-D3EDC256BE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.7a:*:netware:*:*:*:*:*",
              "matchCriteriaId": "75FFC8CC-AB53-40CD-B6DF-C8CC17320FB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0l:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAF40A-00F0-48BA-BEE7-4722C82DC54A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6280F25-3BC7-4701-914A-9ADC35A1A73B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE2CB845-D0E6-4B45-95A1-879BCCA037D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18F9770-12E2-44D5-ABB6-EDFD2383BFF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2CB1E6-63A1-42C5-889C-7EA83CB50543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D42A9F-449C-4F4D-B610-538BF133F744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "5AECADB3-F1EC-4410-AECF-D2C08B18F517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4147A43C-DA7B-4D08-90E9-72DE57B1D61D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3577B789-DBB6-413D-B964-B32FE3E8CD8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:*:solaris:*:*:*:*:*",
              "matchCriteriaId": "FFBC4A27-818F-4B2C-818E-62FB43440DD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "1721BFD6-7914-4ADB-8205-38964C8FFDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "4EB62E6F-87E2-4A98-B4BD-3E0036CE7640",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "418B500F-2A05-4419-997F-E04ECA2E3626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD208FC-AC17-45DF-9A5F-D8CDA6DB3A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "4A29E0A5-9C1D-4CCF-AEEB-FF0B32B4201D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "0CE4230F-88A6-49DD-A05A-FCF4F2A5FF6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "85FAD645-5AFB-4553-85DA-D25E0333A26C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "0D98D58B-AE93-4471-81E0-FD0A4ED1AD51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "85C1DEB1-2628-45D4-9DB4-64A4CF9C89B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "F331B4BD-1381-4011-B2D9-9CD9B73F976B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1.1:*:netware:*:*:*:*:*",
              "matchCriteriaId": "B708CDB3-0BF9-4FE4-855F-DB6E1FE5A319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:5.0:*:netware:*:*:*:*:*",
              "matchCriteriaId": "DA8D4321-3683-460F-AFAA-1D31E9B16818",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:personalization_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B348FC-6FEF-4682-BC25-82E726BFB64E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_enterprise_system:2003q4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8DFE4D-1FB6-41D7-AAB6-82400C6B4504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_enterprise_system:2004q2:*:*:*:*:*:*:*",
              "matchCriteriaId": "132976FA-A42E-4CC0-8C8F-9A034A046B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*",
              "matchCriteriaId": "EE5A4BC2-ED34-4968-881E-ED6AD300AC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*",
              "matchCriteriaId": "D00790CE-CD77-4C39-80AC-5FBD298DD63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*",
              "matchCriteriaId": "BC5F2280-EC46-4D2F-8402-FE91ECEE6A1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur4:*:*:*:*:*:*",
              "matchCriteriaId": "60EBC552-FAC2-4833-B1A6-696DC06301A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:java_system_application_server:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E583F338-CF10-4FD5-8A86-A3CE46E863DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "352D9910-BC83-44B2-B5C0-59B8F2C23142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F316ECED-A6E3-43AC-BA05-C42F2CB0D830",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "FA32646E-1014-47D1-9C96-6CD8F0B13480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "33621D67-8191-42EE-8859-8B5FC30F935A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "0C6F8563-701E-4E54-A0C9-67E9DF74D60D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*",
              "matchCriteriaId": "4022E5C6-5651-45DD-AF73-89CF38E71D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*",
              "matchCriteriaId": "EEF4CFCE-DEEC-4652-A96F-0C7B5A88175A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*",
              "matchCriteriaId": "873034EA-B3C6-43E6-AE98-A04598D9A392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*",
              "matchCriteriaId": "AC90D2B4-4FBE-405A-BD17-F84A37DC914E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp14:*:*:*:*:*:*",
              "matchCriteriaId": "04366BB7-9F1D-4EC0-AE79-9603F71166C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "AE01BAC9-DC57-4BC8-9BFB-9C7C94A516A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "1CEA91AD-443D-4856-AC7A-3DDE0791134D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "07C1D4DC-252A-4602-A916-32E51CCA75B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "526D2FAD-4241-412C-8863-B273D3733153",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "B8A796CB-D675-49FC-98BA-4D527211C70D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "8693959B-7D5D-414B-8660-2A693AF24541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "1BDC4A06-33A1-4619-B870-7F2AF1D332F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*",
              "matchCriteriaId": "8A445032-AD7B-4971-B175-DF3183A4A12C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "38698A3B-9597-4BC9-B112-BB908C3DE86B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "78587B6D-2A95-4714-9632-4F75CD552E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "279FE555-E290-4B17-855D-781C9B58ED55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "26A8BE1A-082B-4CB5-97D0-7964FBC93572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "3609AA35-6B6A-47A1-B1D4-011B735E0671",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E66F55C3-F5BD-49A7-B561-ACD8D522225D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "4493C646-DF4B-45C7-86F7-A71AC9B1CA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "689F0A9F-8F34-4958-B869-C4FB8BC02406",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*",
              "matchCriteriaId": "D73D159B-C3D8-4BBD-8BAA-E9E8D3AD3A04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message."
    }
  ],
  "id": "CVE-2004-0826",
  "lastModified": "2024-11-20T23:49:30.253",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11015"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xforce.iss.net/xforce/alerts/id/180"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://xforce.iss.net/xforce/alerts/id/180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-06-26 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Information from SSL-encrypted sessions via PKCS #1.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "90FA74D1-FF25-44C0-B86C-FBE74A0206CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7F153A-5396-4C3C-995B-570D13DB6B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBDFAE58-F8CC-453F-A006-532212B21F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:open_market_secure_webserver:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2E007E-898A-4EC7-9040-A02DABA3A5B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "B4F9C143-4734-4E5D-9281-F51513C5CAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "547AB6E2-4E9F-4783-8BB4-0AE297A38C9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D47E9C4-5439-4A82-BBD8-D6B482B47E51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A503018-356B-46D9-965F-60750B5B7484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "72E930EF-CCEC-44EA-AA45-18644EFDA5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:collabra_server:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49C090C-979F-44F2-BAAC-71E11611BDF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*",
              "matchCriteriaId": "1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*",
              "matchCriteriaId": "492922BE-3B31-486C-94B5-114089E51E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E0FF18-9B01-4500-9599-8F085655C388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5E0298-99D9-476D-A7DF-36C6207482DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D94D2CA3-9868-4F27-B31D-D3EDC256BE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4147A43C-DA7B-4D08-90E9-72DE57B1D61D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:fasttrack_server:3.01b:*:*:*:*:*:*:*",
              "matchCriteriaId": "55193435-0136-422D-A936-B1FEEC328A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "11AA27C0-D579-49E6-8479-D5DFFAC96D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netscape:proxy_server:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E47FCF41-3D06-493B-AD7B-626F4C279944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssleay:ssleay:0.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "64568219-B33C-4507-9E04-536E7B11D2F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C56055-3DB2-4A23-8301-6F6AB4BA38AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F1B179-25A4-4A72-9E42-43DA61CA1475",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Information from SSL-encrypted sessions via PKCS #1."
    }
  ],
  "id": "CVE-1999-0007",
  "lastModified": "2024-11-20T23:27:35.517",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-06-26T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-327"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-1999-0007
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
Summary
Information from SSL-encrypted sessions via PKCS #1.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T16:27:56.484Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MS98-002",
            "tags": [
              "vendor-advisory",
              "x_refsource_MS",
              "x_transferred"
            ],
            "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Information from SSL-encrypted sessions via PKCS #1."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-11-02T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MS98-002",
          "tags": [
            "vendor-advisory",
            "x_refsource_MS"
          ],
          "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-0007",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Information from SSL-encrypted sessions via PKCS #1."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MS98-002",
              "refsource": "MS",
              "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-0007",
    "datePublished": "1999-09-29T04:00:00",
    "dateReserved": "1999-06-07T00:00:00",
    "dateUpdated": "2024-08-01T16:27:56.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0826
Vulnerability from cvelistv5
Published
2004-09-02 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
References
http://www.securityfocus.com/bid/11015vdb-entry, x_refsource_BID
http://xforce.iss.net/xforce/alerts/id/180third-party-advisory, x_refsource_ISS
https://exchange.xforce.ibmcloud.com/vulnerabilities/16314vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=109351293827731&w=2vendor-advisory, x_refsource_HP
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:31:47.919Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "11015",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11015"
          },
          {
            "name": "20040823 Netscape NSS Library Remote Compromise",
            "tags": [
              "third-party-advisory",
              "x_refsource_ISS",
              "x_transferred"
            ],
            "url": "http://xforce.iss.net/xforce/alerts/id/180"
          },
          {
            "name": "sslv2-client-hello-overflow(16314)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314"
          },
          {
            "name": "SSRT4779",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "11015",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11015"
        },
        {
          "name": "20040823 Netscape NSS Library Remote Compromise",
          "tags": [
            "third-party-advisory",
            "x_refsource_ISS"
          ],
          "url": "http://xforce.iss.net/xforce/alerts/id/180"
        },
        {
          "name": "sslv2-client-hello-overflow(16314)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314"
        },
        {
          "name": "SSRT4779",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0826",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "11015",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11015"
            },
            {
              "name": "20040823 Netscape NSS Library Remote Compromise",
              "refsource": "ISS",
              "url": "http://xforce.iss.net/xforce/alerts/id/180"
            },
            {
              "name": "sslv2-client-hello-overflow(16314)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314"
            },
            {
              "name": "SSRT4779",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0826",
    "datePublished": "2004-09-02T04:00:00",
    "dateReserved": "2004-08-27T00:00:00",
    "dateUpdated": "2024-08-08T00:31:47.919Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}