CVE-2006-5748

Severity

50%

Complexity

99%

Confidentiality

48%

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.

Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger memory corruption.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

Type

Mozilla

First reported 18 years ago

2006-11-08 21:07:00

Last updated 6 years ago

2018-10-17 21:44:00

Affected Software

Mozilla Firefox 1.5

1.5

Mozilla Firefox 1.5 Beta 1

1.5

Mozilla Firefox 1.5 Beta 2

1.5

Mozilla Firefox 1.5.0.1

1.5.0.1

Mozilla Firefox 1.5.0.2

1.5.0.2

Mozilla Firefox 1.5.0.3

1.5.0.3

Mozilla Firefox 1.5.0.4

1.5.0.4

Mozilla Firefox 1.5.0.5

1.5.0.5

Mozilla Firefox 1.5.0.6

1.5.0.6

Mozilla Firefox 1.5.0.7

1.5.0.7

Mozilla SeaMonkey 1.0

1.0

Mozilla SeaMonkey 1.0.1

1.0.1

Mozilla SeaMonkey 1.0.2

1.0.2

Mozilla SeaMonkey 1.0.3

1.0.3

Mozilla SeaMonkey 1.0.5

1.0.5

Mozilla Thunderbird 1.0

1.0

Mozilla Thunderbird 1.0.2

1.0.2

Mozilla Thunderbird 1.0.5

1.0.5

Mozilla Thunderbird 1.0.6

1.0.6

Mozilla Thunderbird 1.0.7

1.0.7

Mozilla Thunderbird 1.0.8

1.0.8

Mozilla Thunderbird 1.5

1.5

Mozilla Thunderbird 1.5 Beta 2

1.5

Mozilla Thunderbird 1.5.0.2

1.5.0.2

Mozilla Thunderbird 1.5.0.4

1.5.0.4

Mozilla Thunderbird 1.5.0.7

1.5.0.7

References

20061101-01-P

Patch

RHSA-2006:0733

Patch, Vendor Advisory

RHSA-2006:0734

Patch, Vendor Advisory

RHSA-2006:0735

Patch, Vendor Advisory

22066

22722

Patch, Vendor Advisory

22727

Patch, Vendor Advisory

22737

Patch, Vendor Advisory

22763

Patch, Vendor Advisory

22770

Patch, Vendor Advisory

22774

Patch, Vendor Advisory

22815

22817

Patch, Vendor Advisory

22929

Patch, Vendor Advisory

22965

Patch, Vendor Advisory

22980

Patch, Vendor Advisory

23009

Patch, Vendor Advisory

23013

Patch, Vendor Advisory

23197

Patch, Vendor Advisory

23202

Patch, Vendor Advisory

23235

Patch, Vendor Advisory

23263

Vendor Advisory

23287

Vendor Advisory

23297

24711

27603

GLSA-200612-06

Patch

GLSA-200612-07

Patch

GLSA-200612-08

1017177

Patch

1017178

Patch

1017179

Patch

103139

201335

http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm

Patch

DSA-1224

Patch

DSA-1225

Patch, Vendor Advisory

DSA-1227

Patch

VU#390480

Patch, US Government Resource

MDKSA-2006:205

MDKSA-2006:206

http://www.mozilla.org/security/announce/2006/mfsa2006-65.html

Patch, Vendor Advisory

SUSE-SA:2006:068

Patch

20061109 rPSA-2006-0206-1 firefox thunderbird

20957

Patch

USN-381-1

Patch, Vendor Advisory

USN-382-1

Patch

TA06-312A

Patch, US Government Resource

ADV-2006-3748

ADV-2006-4387

ADV-2007-1198

ADV-2007-3821

ADV-2008-0083

SSRT061181

https://bugzilla.mozilla.org/show_bug.cgi?id=349527

https://bugzilla.mozilla.org/show_bug.cgi?id=350238

https://bugzilla.mozilla.org/show_bug.cgi?id=351116

https://bugzilla.mozilla.org/show_bug.cgi?id=351973

https://bugzilla.mozilla.org/show_bug.cgi?id=352271

https://bugzilla.mozilla.org/show_bug.cgi?id=352606

https://bugzilla.mozilla.org/show_bug.cgi?id=353165

https://bugzilla.mozilla.org/show_bug.cgi?id=354145

https://bugzilla.mozilla.org/show_bug.cgi?id=354151

mozilla-javascript-engine-code-execution(30096)

https://issues.rpath.com/browse/RPL-765

oval:org.mitre.oval:def:11408

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.