9.3
CVSSv2

CVE-2006-6504

Published: 20/12/2006 Updated: 17/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Mozilla Firefox 2.x prior to 2.0.0.1, 1.5.x prior to 1.5.0.9, and SeaMonkey prior to 1.0.7 allows remote malicious users to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla seamonkey

canonical ubuntu linux 6.06

canonical ubuntu linux 6.10

canonical ubuntu linux 5.10

Vendor Advisories

Various flaws have been reported that allow an attacker to execute arbitrary code with user privileges by tricking the user into opening a malicious web page containing JavaScript or SVG (CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, CVE-2006-6501, CVE-2006-6502, CVE-2006-6504) ...
USN-398-2 fixed vulnerabilities in Firefox 15 However, when auto-filling saved-password login forms without a username field, Firefox would crash This update fixes the problem ...
USN-398-1 fixed vulnerabilities in Firefox 20 This update provides the corresponding updates for Firefox 15 ...
Mozilla Foundation Security Advisory 2006-73 Mozilla SVG Processing Remote Code Execution Announced December 19, 2006 Reporter TippingPoint and the Zero Day Initiative Impact Critical Products Firefox, SeaMonkey Fixed i ...

References

CWE-94http://www.mozilla.org/security/announce/2006/mfsa2006-73.htmlhttp://www.zerodayinitiative.com/advisories/ZDI-06-051.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0758.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0759.htmlhttp://rhn.redhat.com/errata/RHSA-2006-0760.htmlhttp://securitytracker.com/id?1017417http://securitytracker.com/id?1017418http://secunia.com/advisories/23433http://secunia.com/advisories/23439http://secunia.com/advisories/23440https://issues.rpath.com/browse/RPL-883http://www.us-cert.gov/cas/techalerts/TA06-354A.htmlhttp://www.kb.cert.org/vuls/id/928956http://www.securityfocus.com/bid/21668http://secunia.com/advisories/23282http://secunia.com/advisories/23422http://secunia.com/advisories/23468ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.aschttp://secunia.com/advisories/23514http://www.novell.com/linux/security/advisories/2006_80_mozilla.htmlhttp://www.ubuntu.com/usn/usn-398-1http://secunia.com/advisories/23589http://fedoranews.org/cms/node/2297http://fedoranews.org/cms/node/2338http://security.gentoo.org/glsa/glsa-200701-02.xmlhttp://www.ubuntu.com/usn/usn-398-2http://secunia.com/advisories/23601http://secunia.com/advisories/23545http://secunia.com/advisories/23614http://secunia.com/advisories/23618http://www.gentoo.org/security/en/glsa/glsa-200701-04.xmlhttp://secunia.com/advisories/23692http://www.novell.com/linux/security/advisories/2007_06_mozilla.htmlhttp://secunia.com/advisories/23672http://www.mandriva.com/security/advisories?name=MDKSA-2007:010http://www.vupen.com/english/advisories/2008/0083http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742http://www.vupen.com/english/advisories/2006/5068https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11077http://www.securityfocus.com/archive/1/455728/100/200/threadedhttp://www.securityfocus.com/archive/1/455145/100/0/threadedhttp://www.securityfocus.com/archive/1/454939/100/0/threadedhttps://nvd.nist.govhttps://usn.ubuntu.com/398-1/https://www.kb.cert.org/vuls/id/928956