Intrusion Prevention



This indicates a possible exploit of a buffer-overflow vulnerability in the SSLv2 support in Mozilla Network Security Services (NSS).
The vulnerability is caused by the software's inability to handle invalid parameters. A remote attacker may exploit this to execute arbitrary code.

Affected Products

Mozilla Firefox versions prior to
Mozilla Firefox versions prior to
Mozilla SeaMonkey versions prior to 1.0.8
Network Security Services (NSS) versions prior to 3.11.5


System compromise: Remote code execution.

Recommended Actions

Upgrade to Mozilla Firefox version or :
Upgrade to Mozilla SeaMonkey version 1.0.8 :
Upgrade to Network Security Services (NSS) version 3.11.5 :

CVE References