7.1
CVSSv2

CVE-2006-6502

Published: 20/12/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.1 | Impact Score: 6.9 | Exploitability Score: 8.6
VMScore: 632
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

Use-after-free vulnerability in the LiveConnect bridge code for Mozilla Firefox 2.x prior to 2.0.0.1, 1.5.x prior to 1.5.0.9, Thunderbird prior to 1.5.0.9, and SeaMonkey prior to 1.0.7 allows remote malicious users to cause a denial of service (crash) via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox 1.5.0.5

mozilla firefox 1.5.0.6

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla seamonkey 1.0

mozilla thunderbird 0.1

mozilla thunderbird 0.7.1

mozilla thunderbird 0.7.2

mozilla thunderbird 1.0.4

mozilla thunderbird 1.0.5

mozilla thunderbird 1.5.0.2

mozilla thunderbird 1.5.0.3

mozilla firefox 1.5.0.3

mozilla firefox 1.5.0.4

mozilla firefox 2.0

mozilla thunderbird 0.6

mozilla thunderbird 0.7

mozilla thunderbird 1.0.2

mozilla thunderbird 1.0.3

mozilla thunderbird 1.5

mozilla thunderbird 1.5.0.1

mozilla firefox 1.5.0.1

mozilla firefox 1.5.0.2

mozilla firefox 1.5

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.6

mozilla thunderbird 0.4

mozilla thunderbird 0.5

mozilla thunderbird 0.9

mozilla thunderbird 1.0

mozilla thunderbird 1.0.1

mozilla thunderbird 1.0.7

mozilla thunderbird 1.0.8

mozilla thunderbird 1.5.0.7

mozilla thunderbird 1.5.0.8

mozilla firefox 1.5.0.7

mozilla firefox 1.5.0.8

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.4

mozilla thunderbird 0.2

mozilla thunderbird 0.3

mozilla thunderbird 0.7.3

mozilla thunderbird 0.8

mozilla thunderbird 1.0.6

mozilla thunderbird 1.5.0.4

mozilla thunderbird 1.5.0.6

Vendor Advisories

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript or SVG (CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6504) ...
Georgi Guninski and David Bienvenu discovered that long Content-Type and RFC2047-encoded headers we vulnerable to heap overflows By tricking the user into opening a specially crafted email, an attacker could execute arbitrary code with user privileges (CVE-2006-6506) ...
USN-398-2 fixed vulnerabilities in Firefox 15 However, when auto-filling saved-password login forms without a username field, Firefox would crash This update fixes the problem ...
USN-398-1 fixed vulnerabilities in Firefox 20 This update provides the corresponding updates for Firefox 15 ...
Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-6497 Several vulnerabilities in the layout engine allow remote attackers to cause a denial of service and possibly permit them to ...
Several security related problems have been discovered in Mozilla and derived products such as Mozilla Firefox The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-6497 Several vulnerabilities in the layout engine allow remote attackers to cause a denial of service and possibly permit them to ...
Several security related problems have been discovered in Mozilla and derived products The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2006-6497 Several vulnerabilities in the layout engine allow remote attackers to cause a denial of service and possibly permit them to execute arbitrary c ...
Mozilla Foundation Security Advisory 2006-71 LiveConnect crash finalizing JS objects Announced December 19, 2006 Reporter Steven Michaud Impact Critical Products Firefox, SeaMonkey, Thunderbird Fixed in ...

References

NVD-CWE-Otherhttp://www.mozilla.org/security/announce/2006/mfsa2006-71.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0758.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0759.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0760.htmlhttp://securitytracker.com/id?1017411http://securitytracker.com/id?1017412http://securitytracker.com/id?1017413http://secunia.com/advisories/23433http://secunia.com/advisories/23439http://secunia.com/advisories/23440https://issues.rpath.com/browse/RPL-883http://www.us-cert.gov/cas/techalerts/TA06-354A.htmlhttp://www.securityfocus.com/bid/21668http://secunia.com/advisories/23282http://secunia.com/advisories/23420http://secunia.com/advisories/23422http://secunia.com/advisories/23468ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.aschttp://secunia.com/advisories/23514http://www.novell.com/linux/security/advisories/2006_80_mozilla.htmlhttp://www.ubuntu.com/usn/usn-398-1http://secunia.com/advisories/23589http://fedoranews.org/cms/node/2297http://fedoranews.org/cms/node/2338http://security.gentoo.org/glsa/glsa-200701-02.xmlhttp://www.gentoo.org/security/en/glsa/glsa-200701-03.xmlhttp://www.ubuntu.com/usn/usn-398-2http://www.ubuntu.com/usn/usn-400-1http://secunia.com/advisories/23601http://secunia.com/advisories/23545http://secunia.com/advisories/23591http://secunia.com/advisories/23598http://secunia.com/advisories/23614http://secunia.com/advisories/23618http://www.gentoo.org/security/en/glsa/glsa-200701-04.xmlhttp://secunia.com/advisories/23692http://www.novell.com/linux/security/advisories/2007_06_mozilla.htmlhttp://www.kb.cert.org/vuls/id/428500http://secunia.com/advisories/23672http://www.debian.org/security/2007/dsa-1253http://www.debian.org/security/2007/dsa-1258http://www.debian.org/security/2007/dsa-1265http://secunia.com/advisories/23988http://secunia.com/advisories/24078http://secunia.com/advisories/24390http://www.mandriva.com/security/advisories?name=MDKSA-2007:010http://www.mandriva.com/security/advisories?name=MDKSA-2007:011http://www.vupen.com/english/advisories/2008/0083http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742http://www.vupen.com/english/advisories/2006/5068https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9626http://www.securityfocus.com/archive/1/455728/100/200/threadedhttp://www.securityfocus.com/archive/1/455145/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/398-1/https://www.kb.cert.org/vuls/id/428500