Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/11015 | vdb entry patch |
http://xforce.iss.net/xforce/alerts/id/180 | third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 | vdb entry |
http://marc.info/?l=bugtraq&m=109351293827731&w=2 | vendor advisory |