7.5
CVSSv2

CVE-2006-2776

Published: 02/06/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Certain privileged UI code in Mozilla Firefox and Thunderbird prior to 1.5.0.4 calls content-defined setters on an object prototype, which allows remote malicious users to execute code at a higher privilege than intended.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 0.10

mozilla firefox 0.10.1

mozilla firefox 1.0

mozilla firefox 1.0.1

mozilla firefox 1.0.7

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla thunderbird 0.3

mozilla thunderbird 0.4

mozilla thunderbird 0.8

mozilla thunderbird 0.9

mozilla thunderbird 1.0.6

mozilla thunderbird 1.0.7

mozilla firefox 0.8

mozilla firefox 0.9

mozilla firefox 1.0.2

mozilla firefox 1.0.3

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.3

mozilla thunderbird 0.5

mozilla thunderbird 0.6

mozilla thunderbird 1.0

mozilla thunderbird 1.0.1

mozilla thunderbird 1.5

mozilla thunderbird 1.5.0.1

mozilla firefox 0.9.3

mozilla firefox 1.0.6

mozilla thunderbird 0.1

mozilla thunderbird 0.2

mozilla thunderbird 0.7.2

mozilla thunderbird 0.7.3

mozilla thunderbird 1.0.4

mozilla thunderbird 1.0.5

mozilla firefox 0.9.1

mozilla firefox 0.9.2

mozilla firefox 1.0.4

mozilla firefox 1.0.5

mozilla thunderbird 0.7

mozilla thunderbird 0.7.1

mozilla thunderbird 1.0.2

mozilla thunderbird 1.0.3

Vendor Advisories

USN-297-1 fixed several vulnerabilities in Thunderbird for the Ubuntu 606 LTS release This update provides the corresponding fixes for Ubuntu 504 and Ubuntu 510 ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
USN-296-1 fixed several vulnerabilities in Firefox for the Ubuntu 606 LTS release This update provides the corresponding fixes for Ubuntu 504 and Ubuntu 510 ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
Jonas Sicking discovered that under some circumstances persisted XUL attributes are associated with the wrong URL A malicious web site could exploit this to execute arbitrary code with the privileges of the user (MFSA 2006-35, CVE-2006-2775) ...
Several security related problems have been discovered in Mozilla which are also present in Mozilla Thunderbird The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-1942 Eric Foley discovered that a user can be tricked to expose a local file to a remote attacker by displaying a local file as ...
Several security related problems have been discovered in Mozilla The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-1942 Eric Foley discovered that a user can be tricked to expose a local file to a remote attacker by displaying a local file as image in connection with other vulnerabili ...
Mozilla Foundation Security Advisory 2006-37 Remote compromise via content-defined setter on object prototypes Announced June 1, 2006 Reporter Paul Nickerson, moz_bug_r_a4 Impact Critical Products Firefox, SeaMonkey, Thunder ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2006/mfsa2006-37.htmlhttp://www.kb.cert.org/vuls/id/575969http://www.us-cert.gov/cas/techalerts/TA06-153A.htmlhttp://www.securityfocus.com/bid/18228http://securitytracker.com/id?1016202http://securitytracker.com/id?1016214http://secunia.com/advisories/20376http://secunia.com/advisories/20382http://www.gentoo.org/security/en/glsa/glsa-200606-12.xmlhttp://secunia.com/advisories/20561http://www.gentoo.org/security/en/glsa/glsa-200606-21.xmlhttp://www.novell.com/linux/security/advisories/2006_35_mozilla.htmlhttp://secunia.com/advisories/20709http://www.redhat.com/support/errata/RHSA-2006-0578.htmlhttp://secunia.com/advisories/21134http://www.debian.org/security/2006/dsa-1118http://www.debian.org/security/2006/dsa-1120http://secunia.com/advisories/21183http://secunia.com/advisories/21176http://secunia.com/advisories/21178http://secunia.com/advisories/21188http://secunia.com/advisories/21210http://www.debian.org/security/2006/dsa-1134http://www.redhat.com/support/errata/RHSA-2006-0610.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0611.htmlhttp://secunia.com/advisories/21269http://secunia.com/advisories/21270http://rhn.redhat.com/errata/RHSA-2006-0609.htmlhttp://secunia.com/advisories/21336http://secunia.com/advisories/21324http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://www.redhat.com/support/errata/RHSA-2006-0594.htmlhttp://secunia.com/advisories/21631http://sunsolve.sun.com/search/document.do?assetkey=1-26-102800-1http://secunia.com/advisories/24108http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2006/2106http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2008/0083http://www.vupen.com/english/advisories/2007/0573https://exchange.xforce.ibmcloud.com/vulnerabilities/26848https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9849https://usn.ubuntu.com/323-1/https://usn.ubuntu.com/297-3/https://usn.ubuntu.com/297-1/https://usn.ubuntu.com/296-2/https://usn.ubuntu.com/296-1/http://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/435795/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/297-3/https://www.kb.cert.org/vuls/id/575969