|Stack-based buffer overflow in the SSLv2 support in Mozilla Network
Security Services (NSS) before 3.11.5, as used by Firefox before
18.104.22.168 and 2.x before 22.214.171.124, Thunderbird before 126.96.36.199,
SeaMonkey before 1.0.8, and certain Sun Java System server products
before 20070611, allows remote attackers to execute arbitrary code via
invalid "Client Master Key" length values.