Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc - Vendor Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2006-0609.html - | |
References | () http://secunia.com/advisories/19873 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21216 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21228 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21229 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21243 - | |
References | () http://secunia.com/advisories/21246 - | |
References | () http://secunia.com/advisories/21250 - Vendor Advisory | |
References | () http://secunia.com/advisories/21262 - Vendor Advisory | |
References | () http://secunia.com/advisories/21269 - | |
References | () http://secunia.com/advisories/21270 - | |
References | () http://secunia.com/advisories/21275 - | |
References | () http://secunia.com/advisories/21336 - Vendor Advisory | |
References | () http://secunia.com/advisories/21343 - Vendor Advisory | |
References | () http://secunia.com/advisories/21358 - Vendor Advisory | |
References | () http://secunia.com/advisories/21361 - Vendor Advisory | |
References | () http://secunia.com/advisories/21529 - Vendor Advisory | |
References | () http://secunia.com/advisories/21532 - | |
References | () http://secunia.com/advisories/21607 - | |
References | () http://secunia.com/advisories/21631 - | |
References | () http://secunia.com/advisories/21675 - | |
References | () http://secunia.com/advisories/22055 - | |
References | () http://secunia.com/advisories/22065 - | |
References | () http://secunia.com/advisories/22066 - | |
References | () http://secunia.com/advisories/22210 - | |
References | () http://secunia.com/advisories/22342 - | |
References | () http://secunia.com/advisories/25839 - | |
References | () http://security.gentoo.org/glsa/glsa-200608-02.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200608-04.xml - | |
References | () http://securitytracker.com/id?1016586 - | |
References | () http://securitytracker.com/id?1016587 - | |
References | () http://securitytracker.com/id?1016588 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1 - | |
References | () http://www.debian.org/security/2006/dsa-1161 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml - | |
References | () http://www.kb.cert.org/vuls/id/527676 - US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:146 - | |
References | () http://www.mozilla.org/security/announce/2006/mfsa2006-55.html - Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0594.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0608.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0610.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0611.html - | |
References | () http://www.securityfocus.com/archive/1/441333/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/446657/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/446658/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/19181 - Patch | |
References | () http://www.ubuntu.com/usn/usn-350-1 - | |
References | () http://www.ubuntu.com/usn/usn-354-1 - | |
References | () http://www.ubuntu.com/usn/usn-361-1 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA06-208A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2006/2998 - | |
References | () http://www.vupen.com/english/advisories/2006/3748 - | |
References | () http://www.vupen.com/english/advisories/2006/3749 - | |
References | () http://www.vupen.com/english/advisories/2007/2350 - | |
References | () http://www.vupen.com/english/advisories/2008/0083 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27992 - | |
References | () https://issues.rpath.com/browse/RPL-536 - | |
References | () https://issues.rpath.com/browse/RPL-537 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934 - | |
References | () https://usn.ubuntu.com/327-1/ - | |
References | () https://usn.ubuntu.com/329-1/ - |
Information
Published : 2006-07-27 20:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3811
Mitre link : CVE-2006-3811
CVE.ORG link : CVE-2006-3811
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
- seamonkey
CWE