VYPR
Unrated severityNVD Advisory· Published Dec 31, 2004· Updated Apr 16, 2026

CVE-2004-0826

CVE-2004-0826

Description

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.

Affected products

93
  • cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*
    • cpe:2.3:a:netscape:certificate_server:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*
    • cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*
    • cpe:2.3:a:netscape:directory_server:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:directory_server:4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:directory_server:4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*+ 28 more
    • cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:2.0.1c:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.0.7a:*:netware:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.0l:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.5:*:solaris:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.6:*:solaris:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.6:sp1:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:3.6:sp3:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1.1:*:netware:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp5:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp6:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp7:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:4.1:sp8:*:*:*:*:*:*
    • cpe:2.3:a:netscape:enterprise_server:5.0:*:netware:*:*:*:*:*
  • cpe:2.3:a:netscape:personalization_engine:*:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:java_enterprise_system:2003q4:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:sun:java_enterprise_system:2003q4:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:java_enterprise_system:2004q2:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*+ 4 more
    • cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*
    • cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*
    • cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*
    • cpe:2.3:a:sun:java_system_application_server:7.0:ur4:*:*:*:*:*:*
    • cpe:2.3:a:sun:java_system_application_server:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_application_server:6.0:sp1:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_application_server:6.0:sp2:*:*:*:*:*:*
  • cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*+ 22 more
    • cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp14:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.0:sp7:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.0:sp8:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*
    • cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*
  • HP/Hpux3 versions
    cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
    • cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
    • cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.