Description
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
Published: 2004-09-02
Score: 7.5 High
EPSS: 3.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2004-0824 Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
History

No history.

Subscriptions

Hp Hp-ux
Mozilla Network Security Services
Netscape Certificate Server Directory Server Enterprise Server Personalization Engine
Sun Java Enterprise System Java System Application Server One Application Server One Web Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:31:47.919Z

Reserved: 2004-08-27T00:00:00.000Z

Link: CVE-2004-0826

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2004-12-31T05:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2004-0826

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses