NA
CVSSv3

CVE-2006-3807

CVSSv4: NA | CVSSv3: NA | CVSSv2: 7.5 | VMScore: 850 | EPSS: 0.88574 | KEV: Not Included
Published: 27/07/2006 Updated: 21/11/2024

Vulnerability Summary

Mozilla Firefox prior to 1.5.0.5, Thunderbird prior to 1.5.0.5, and SeaMonkey prior to 1.0.3 allows remote malicious users to execute arbitrary code via script that changes the standard Object() constructor to return a reference to a privileged object and calling "named JavaScript functions" that use the constructor.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.5

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.2

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla seamonkey 1.0

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla thunderbird 1.5

mozilla thunderbird 1.5.0.2

mozilla thunderbird 1.5.0.4

Vendor Advisories

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious email containing JavaScript Please note that JavaScript is disabled by default for emails, and it is not recommended to enable it (CVE-2006-3113, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006 ...
This update upgrades Thunderbird from 108 to 1507 This step was necessary since the 10x series is not supported by upstream any more ...
Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL (CVE-2006-2788, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-4565, CVE-2006-4568, CVE-2006-4571) ...
Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious URL (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812) ...
The latest security updates of Mozilla Thunderbird introduced a regression that led to a dysfunctional attachment panel which warrants a correction to fix this issue For reference please find below the original advisory text: Several security related problems have been discovered in Mozilla and derived products such as Mozilla Thunderbird The Co ...
The latest security updates of Mozilla introduced a regression that led to a dysfunctional attachment panel which warrants a correction to fix this issue For reference please find below the original advisory text: Several security related problems have been discovered in Mozilla and derived products The Common Vulnerabilities and Exposures proje ...
Mozilla Foundation Security Advisory 2006-51 Privilege escalation using named-functions and redefined "new Object()" Announced July 25, 2006 Reporter moz_bug_r_a4 Impact Critical Products Firefox, SeaMonkey, Thunderbird ...

References

NVD-CWE-Otherhttps://nvd.nist.govhttps://usn.ubuntu.com/329-1/https://www.first.org/epsshttps://www.kb.cert.org/vuls/id/687396ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://rhn.redhat.com/errata/RHSA-2006-0609.htmlhttp://secunia.com/advisories/19873http://secunia.com/advisories/21216http://secunia.com/advisories/21228http://secunia.com/advisories/21229http://secunia.com/advisories/21243http://secunia.com/advisories/21246http://secunia.com/advisories/21250http://secunia.com/advisories/21262http://secunia.com/advisories/21269http://secunia.com/advisories/21270http://secunia.com/advisories/21275http://secunia.com/advisories/21336http://secunia.com/advisories/21343http://secunia.com/advisories/21358http://secunia.com/advisories/21361http://secunia.com/advisories/21529http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://secunia.com/advisories/21631http://secunia.com/advisories/21634http://secunia.com/advisories/21654http://secunia.com/advisories/21675http://secunia.com/advisories/22055http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://secunia.com/advisories/22210http://secunia.com/advisories/22342http://security.gentoo.org/glsa/glsa-200608-02.xmlhttp://security.gentoo.org/glsa/glsa-200608-04.xmlhttp://securitytracker.com/id?1016586http://securitytracker.com/id?1016587http://securitytracker.com/id?1016588http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1http://www.debian.org/security/2006/dsa-1159http://www.debian.org/security/2006/dsa-1160http://www.debian.org/security/2006/dsa-1161http://www.gentoo.org/security/en/glsa/glsa-200608-03.xmlhttp://www.kb.cert.org/vuls/id/687396http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://www.mozilla.org/security/announce/2006/mfsa2006-51.htmlhttp://www.novell.com/linux/security/advisories/2006_48_seamonkey.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0594.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0608.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0610.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0611.htmlhttp://www.securityfocus.com/archive/1/441333/100/0/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/bid/19181http://www.ubuntu.com/usn/usn-350-1http://www.ubuntu.com/usn/usn-354-1http://www.ubuntu.com/usn/usn-361-1http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlhttp://www.vupen.com/english/advisories/2006/2998http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2007/0058http://www.vupen.com/english/advisories/2008/0083https://exchange.xforce.ibmcloud.com/vulnerabilities/27988https://issues.rpath.com/browse/RPL-536https://issues.rpath.com/browse/RPL-537https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10374https://usn.ubuntu.com/327-1/https://usn.ubuntu.com/329-1/ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://rhn.redhat.com/errata/RHSA-2006-0609.htmlhttp://secunia.com/advisories/19873http://secunia.com/advisories/21216http://secunia.com/advisories/21228http://secunia.com/advisories/21229http://secunia.com/advisories/21243http://secunia.com/advisories/21246http://secunia.com/advisories/21250http://secunia.com/advisories/21262http://secunia.com/advisories/21269http://secunia.com/advisories/21270http://secunia.com/advisories/21275http://secunia.com/advisories/21336http://secunia.com/advisories/21343http://secunia.com/advisories/21358http://secunia.com/advisories/21361http://secunia.com/advisories/21529http://secunia.com/advisories/21532http://secunia.com/advisories/21607http://secunia.com/advisories/21631http://secunia.com/advisories/21634http://secunia.com/advisories/21654http://secunia.com/advisories/21675http://secunia.com/advisories/22055http://secunia.com/advisories/22065http://secunia.com/advisories/22066http://secunia.com/advisories/22210http://secunia.com/advisories/22342http://security.gentoo.org/glsa/glsa-200608-02.xmlhttp://security.gentoo.org/glsa/glsa-200608-04.xmlhttp://securitytracker.com/id?1016586http://securitytracker.com/id?1016587http://securitytracker.com/id?1016588http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1http://www.debian.org/security/2006/dsa-1159http://www.debian.org/security/2006/dsa-1160http://www.debian.org/security/2006/dsa-1161http://www.gentoo.org/security/en/glsa/glsa-200608-03.xmlhttp://www.kb.cert.org/vuls/id/687396http://www.mandriva.com/security/advisories?name=MDKSA-2006:143http://www.mandriva.com/security/advisories?name=MDKSA-2006:145http://www.mandriva.com/security/advisories?name=MDKSA-2006:146http://www.mozilla.org/security/announce/2006/mfsa2006-51.htmlhttp://www.novell.com/linux/security/advisories/2006_48_seamonkey.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0594.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0608.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0610.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0611.htmlhttp://www.securityfocus.com/archive/1/441333/100/0/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446657/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/archive/1/446658/100/200/threadedhttp://www.securityfocus.com/bid/19181http://www.ubuntu.com/usn/usn-350-1http://www.ubuntu.com/usn/usn-354-1http://www.ubuntu.com/usn/usn-361-1http://www.us-cert.gov/cas/techalerts/TA06-208A.htmlhttp://www.vupen.com/english/advisories/2006/2998http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2006/3749http://www.vupen.com/english/advisories/2007/0058http://www.vupen.com/english/advisories/2008/0083https://exchange.xforce.ibmcloud.com/vulnerabilities/27988https://issues.rpath.com/browse/RPL-536https://issues.rpath.com/browse/RPL-537https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10374https://usn.ubuntu.com/327-1/https://usn.ubuntu.com/329-1/