7.5
CVSSv2

CVE-2006-2775

Published: 02/06/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Mozilla Firefox and Thunderbird prior to 1.5.0.4 associates XUL attributes with the wrong URL under certain unspecified circumstances, which might allow remote malicious users to bypass restrictions by causing a persisted string to be associated with the wrong URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.9.2

mozilla firefox 0.9.3

mozilla firefox 1.0.5

mozilla firefox 1.0.6

mozilla firefox 1.5

mozilla thunderbird 0.1

mozilla thunderbird 0.7.2

mozilla thunderbird 0.7.3

mozilla thunderbird 1.0.4

mozilla thunderbird 1.0.5

mozilla thunderbird

mozilla firefox 0.9

mozilla firefox 0.9.1

mozilla firefox 1.0.3

mozilla firefox 1.0.4

mozilla firefox 1.5.0.2

mozilla thunderbird 0.7

mozilla thunderbird 0.7.1

mozilla thunderbird 1.0.2

mozilla thunderbird 1.0.3

mozilla thunderbird 1.5

mozilla firefox

mozilla firefox 0.10

mozilla firefox 0.10.1

mozilla firefox 0.8

mozilla firefox 1.0.1

mozilla firefox 1.0.2

mozilla firefox 1.5.0.1

mozilla thunderbird 0.5

mozilla thunderbird 0.6

mozilla thunderbird 1.0

mozilla thunderbird 1.0.1

mozilla thunderbird 1.0.7

mozilla firefox 1.0

mozilla firefox 1.0.7

mozilla thunderbird 0.2

mozilla thunderbird 0.3

mozilla thunderbird 0.4

mozilla thunderbird 0.8

mozilla thunderbird 0.9

mozilla thunderbird 1.0.6

Vendor Advisories

USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu 606 LTS release This update provides the corresponding fixes for Ubuntu 504 and Ubuntu 510 ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 606 LTS release This update provides the corresponding fixes for Ubuntu 504 and Ubuntu 510 ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
Several security related problems have been discovered in Mozilla which are also present in Mozilla Thunderbird The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-1942 Eric Foley discovered that a user can be tricked to expose a local file to a remote attacker by displaying a local file as ...
Several security related problems have been discovered in Mozilla The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-1942 Eric Foley discovered that a user can be tricked to expose a local file to a remote attacker by displaying a local file as image in connection with other vulnerabili ...
Mozilla Foundation Security Advisory 2006-35 Privilege escalation through XUL persist Announced June 1, 2006 Reporter Jonas Sicking (Mozilla) Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...

References

CWE-264http://www.mozilla.org/security/announce/2006/mfsa2006-35.htmlhttp://www.kb.cert.org/vuls/id/243153http://www.us-cert.gov/cas/techalerts/TA06-153A.htmlhttp://www.securityfocus.com/bid/18228http://securitytracker.com/id?1016202http://securitytracker.com/id?1016214http://secunia.com/advisories/20376http://secunia.com/advisories/20382http://www.gentoo.org/security/en/glsa/glsa-200606-12.xmlhttp://secunia.com/advisories/20561http://www.gentoo.org/security/en/glsa/glsa-200606-21.xmlhttp://www.novell.com/linux/security/advisories/2006_35_mozilla.htmlhttp://secunia.com/advisories/20709http://www.debian.org/security/2006/dsa-1118http://www.debian.org/security/2006/dsa-1120http://secunia.com/advisories/21183http://secunia.com/advisories/21176http://secunia.com/advisories/21178http://secunia.com/advisories/21188http://secunia.com/advisories/21210http://www.debian.org/security/2006/dsa-1134http://secunia.com/advisories/21324http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://www.vupen.com/english/advisories/2008/0083http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2006/2106http://www.vupen.com/english/advisories/2006/3748https://exchange.xforce.ibmcloud.com/vulnerabilities/26846https://usn.ubuntu.com/323-1/https://usn.ubuntu.com/297-3/https://usn.ubuntu.com/297-1/https://usn.ubuntu.com/296-2/https://usn.ubuntu.com/296-1/http://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/435795/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/297-3/https://www.kb.cert.org/vuls/id/243153