NA
CVSSv3

CVE-2006-3803

CVSSv4: NA | CVSSv3: NA | CVSSv2: 5.1 | VMScore: 610 | EPSS: 0.94825 | KEV: Not Included
Published: 27/07/2006 Updated: 21/11/2024

Vulnerability Summary

Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 might allow remote malicious users to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla seamonkey 1.0

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla thunderbird 1.5

mozilla thunderbird 1.5.0.2

mozilla thunderbird 1.5.0.4

Vendor Advisories

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006 ...
This update upgrades Thunderbird from 108 to 1507 This step was necessary since the 10x series is not supported by upstream any more ...
Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812) ...
Mozilla Foundation Security Advisory 2006-48 JavaScript new Function race condition Announced July 25, 2006 Reporter H D Moore Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...

References

NVD-CWE-Otherhttps://nvd.nist.govhttps://usn.ubuntu.com/329-1/https://www.first.org/epsshttps://www.kb.cert.org/vuls/id/265964ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://rhn.redhat.com/errata/RHSA-2006-0609.htmlhttp://secunia.com/advisories/19873http://secunia.com/advisories/21216http://secunia.com/advisories/21228http://secunia.com/advisories/21229http://secunia.com/advisories/21243http://secunia.com/advisories/21246http://secunia.com/advisories/21250http://secunia.com/advisories/21262http://secunia.com/advisories/21269http://secunia.com/advisories/21270http://secunia.com/advisories/21275http://secunia.com/advisories/21336http://secunia.com/advisories/21343http://secunia.com/advisories/21358http://secunia.com/advisories/21361http://secunia.com/advisories/21529http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://secunia.com/advisories/21631http://secunia.com/advisories/22055http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://secunia.com/advisories/22210http://security.gentoo.org/glsa/glsa-200608-02.xmlhttp://security.gentoo.org/glsa/glsa-200608-04.xmlhttp://securitytracker.com/id?1016586http://securitytracker.com/id?1016587http://securitytracker.com/id?1016588http://www.gentoo.org/security/en/glsa/glsa-200608-03.xmlhttp://www.kb.cert.org/vuls/id/265964http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://www.mozilla.org/security/announce/2006/mfsa2006-48.htmlhttp://www.novell.com/linux/security/advisories/2006_48_seamonkey.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0594.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0608.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0610.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0611.htmlhttp://www.securityfocus.com/archive/1/441333/100/0/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/bid/19181http://www.ubuntu.com/usn/usn-350-1http://www.ubuntu.com/usn/usn-354-1http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlhttp://www.vupen.com/english/advisories/2006/2998http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2008/0083https://exchange.xforce.ibmcloud.com/vulnerabilities/27984https://issues.rpath.com/browse/RPL-536https://issues.rpath.com/browse/RPL-537https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635https://usn.ubuntu.com/327-1/https://usn.ubuntu.com/329-1/ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://rhn.redhat.com/errata/RHSA-2006-0609.htmlhttp://secunia.com/advisories/19873http://secunia.com/advisories/21216http://secunia.com/advisories/21228http://secunia.com/advisories/21229http://secunia.com/advisories/21243http://secunia.com/advisories/21246http://secunia.com/advisories/21250http://secunia.com/advisories/21262http://secunia.com/advisories/21269http://secunia.com/advisories/21270http://secunia.com/advisories/21275http://secunia.com/advisories/21336http://secunia.com/advisories/21343http://secunia.com/advisories/21358http://secunia.com/advisories/21361http://secunia.com/advisories/21529http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://secunia.com/advisories/21631http://secunia.com/advisories/22055http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://secunia.com/advisories/22210http://security.gentoo.org/glsa/glsa-200608-02.xmlhttp://security.gentoo.org/glsa/glsa-200608-04.xmlhttp://securitytracker.com/id?1016586http://securitytracker.com/id?1016587http://securitytracker.com/id?1016588http://www.gentoo.org/security/en/glsa/glsa-200608-03.xmlhttp://www.kb.cert.org/vuls/id/265964http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://www.mozilla.org/security/announce/2006/mfsa2006-48.htmlhttp://www.novell.com/linux/security/advisories/2006_48_seamonkey.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0594.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0608.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0610.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0611.htmlhttp://www.securityfocus.com/archive/1/441333/100/0/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/bid/19181http://www.ubuntu.com/usn/usn-350-1http://www.ubuntu.com/usn/usn-354-1http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlhttp://www.vupen.com/english/advisories/2006/2998http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2008/0083https://exchange.xforce.ibmcloud.com/vulnerabilities/27984https://issues.rpath.com/browse/RPL-536https://issues.rpath.com/browse/RPL-537https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635https://usn.ubuntu.com/327-1/https://usn.ubuntu.com/329-1/