6.8
CVSSv2

CVE-2006-6500

Published: 20/12/2006 Updated: 09/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in Mozilla Firefox 2.x prior to 2.0.0.1, 1.5.x prior to 1.5.0.9, Thunderbird prior to 1.5.0.9, and SeaMonkey prior to 1.0.7 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey

mozilla firefox

mozilla thunderbird

debian debian linux 3.1

debian debian linux 4.0

canonical ubuntu linux 5.10

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

Vendor Advisories

Mozilla Foundation Security Advisory 2006-69 CSS cursor image buffer overflow (Windows only) Announced December 19, 2006 Reporter Frederik Reiss Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...