CVE-2006-4570

Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
http://secunia.com/advisories/21915
http://secunia.com/advisories/21916
http://secunia.com/advisories/21939
http://secunia.com/advisories/21940
http://secunia.com/advisories/22036
http://secunia.com/advisories/22055
http://secunia.com/advisories/22056
http://secunia.com/advisories/22074
http://secunia.com/advisories/22088
http://secunia.com/advisories/22247
http://secunia.com/advisories/22274
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22391
http://security.gentoo.org/glsa/glsa-200610-01.xml
http://security.gentoo.org/glsa/glsa-200610-04.xml
http://securitytracker.com/id?1016866
http://securitytracker.com/id?1016867
http://www.debian.org/security/2006/dsa-1192
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
http://www.mozilla.org/security/announce/2006/mfsa2006-63.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_54_mozilla.html
http://www.redhat.com/support/errata/RHSA-2006-0676.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html Patch Vendor Advisory
http://www.securityfocus.com/bid/20042
http://www.ubuntu.com/usn/usn-350-1
http://www.ubuntu.com/usn/usn-352-1
http://www.ubuntu.com/usn/usn-361-1
http://www.us.debian.org/security/2006/dsa-1191
https://exchange.xforce.ibmcloud.com/vulnerabilities/28962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10892
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
http://secunia.com/advisories/21915
http://secunia.com/advisories/21916
http://secunia.com/advisories/21939
http://secunia.com/advisories/21940
http://secunia.com/advisories/22036
http://secunia.com/advisories/22055
http://secunia.com/advisories/22056
http://secunia.com/advisories/22074
http://secunia.com/advisories/22088
http://secunia.com/advisories/22247
http://secunia.com/advisories/22274
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22391
http://security.gentoo.org/glsa/glsa-200610-01.xml
http://security.gentoo.org/glsa/glsa-200610-04.xml
http://securitytracker.com/id?1016866
http://securitytracker.com/id?1016867
http://www.debian.org/security/2006/dsa-1192
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
http://www.mozilla.org/security/announce/2006/mfsa2006-63.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_54_mozilla.html
http://www.redhat.com/support/errata/RHSA-2006-0676.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html Patch Vendor Advisory
http://www.securityfocus.com/bid/20042
http://www.ubuntu.com/usn/usn-350-1
http://www.ubuntu.com/usn/usn-352-1
http://www.ubuntu.com/usn/usn-361-1
http://www.us.debian.org/security/2006/dsa-1191
https://exchange.xforce.ibmcloud.com/vulnerabilities/28962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10892
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc -
References () http://secunia.com/advisories/21915 - () http://secunia.com/advisories/21915 -
References () http://secunia.com/advisories/21916 - () http://secunia.com/advisories/21916 -
References () http://secunia.com/advisories/21939 - () http://secunia.com/advisories/21939 -
References () http://secunia.com/advisories/21940 - () http://secunia.com/advisories/21940 -
References () http://secunia.com/advisories/22036 - () http://secunia.com/advisories/22036 -
References () http://secunia.com/advisories/22055 - () http://secunia.com/advisories/22055 -
References () http://secunia.com/advisories/22056 - () http://secunia.com/advisories/22056 -
References () http://secunia.com/advisories/22074 - () http://secunia.com/advisories/22074 -
References () http://secunia.com/advisories/22088 - () http://secunia.com/advisories/22088 -
References () http://secunia.com/advisories/22247 - () http://secunia.com/advisories/22247 -
References () http://secunia.com/advisories/22274 - () http://secunia.com/advisories/22274 -
References () http://secunia.com/advisories/22299 - () http://secunia.com/advisories/22299 -
References () http://secunia.com/advisories/22342 - () http://secunia.com/advisories/22342 -
References () http://secunia.com/advisories/22391 - () http://secunia.com/advisories/22391 -
References () http://security.gentoo.org/glsa/glsa-200610-01.xml - () http://security.gentoo.org/glsa/glsa-200610-01.xml -
References () http://security.gentoo.org/glsa/glsa-200610-04.xml - () http://security.gentoo.org/glsa/glsa-200610-04.xml -
References () http://securitytracker.com/id?1016866 - () http://securitytracker.com/id?1016866 -
References () http://securitytracker.com/id?1016867 - () http://securitytracker.com/id?1016867 -
References () http://www.debian.org/security/2006/dsa-1192 - () http://www.debian.org/security/2006/dsa-1192 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:169 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:169 -
References () http://www.mozilla.org/security/announce/2006/mfsa2006-63.html - Vendor Advisory () http://www.mozilla.org/security/announce/2006/mfsa2006-63.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_54_mozilla.html - () http://www.novell.com/linux/security/advisories/2006_54_mozilla.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0676.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0676.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2006-0677.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0677.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/20042 - () http://www.securityfocus.com/bid/20042 -
References () http://www.ubuntu.com/usn/usn-350-1 - () http://www.ubuntu.com/usn/usn-350-1 -
References () http://www.ubuntu.com/usn/usn-352-1 - () http://www.ubuntu.com/usn/usn-352-1 -
References () http://www.ubuntu.com/usn/usn-361-1 - () http://www.ubuntu.com/usn/usn-361-1 -
References () http://www.us.debian.org/security/2006/dsa-1191 - () http://www.us.debian.org/security/2006/dsa-1191 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28962 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28962 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10892 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10892 -

Information

Published : 2006-09-15 19:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4570

Mitre link : CVE-2006-4570

CVE.ORG link : CVE-2006-4570


JSON object : View

Products Affected

mozilla

  • seamonkey
  • thunderbird