CVE-2006-5747

Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P Patch
http://rhn.redhat.com/errata/RHSA-2006-0733.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0734.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0735.html Patch Vendor Advisory
http://secunia.com/advisories/22066
http://secunia.com/advisories/22722 Patch Vendor Advisory
http://secunia.com/advisories/22727 Patch Vendor Advisory
http://secunia.com/advisories/22737 Patch Vendor Advisory
http://secunia.com/advisories/22763 Patch Vendor Advisory
http://secunia.com/advisories/22770 Patch Vendor Advisory
http://secunia.com/advisories/22774 Patch Vendor Advisory
http://secunia.com/advisories/22815
http://secunia.com/advisories/22817 Patch Vendor Advisory
http://secunia.com/advisories/22929 Patch Vendor Advisory
http://secunia.com/advisories/22965 Patch Vendor Advisory
http://secunia.com/advisories/22980 Patch Vendor Advisory
http://secunia.com/advisories/23009 Patch Vendor Advisory
http://secunia.com/advisories/23013 Patch Vendor Advisory
http://secunia.com/advisories/23263 Patch Vendor Advisory
http://secunia.com/advisories/23287 Patch Vendor Advisory
http://secunia.com/advisories/23297 Patch Vendor Advisory
http://secunia.com/advisories/24711
http://security.gentoo.org/glsa/glsa-200612-06.xml Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200612-07.xml Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200612-08.xml Patch Vendor Advisory
http://securitytracker.com/id?1017177 Patch
http://securitytracker.com/id?1017178 Patch
http://securitytracker.com/id?1017179 Patch
http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/815432 Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:205
http://www.mandriva.com/security/advisories?name=MDKSA-2006:206
http://www.mozilla.org/security/announce/2006/mfsa2006-65.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_68_mozilla.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/451099/100/0/threaded
http://www.securityfocus.com/bid/20957
http://www.ubuntu.com/usn/usn-381-1 Patch Vendor Advisory
http://www.ubuntu.com/usn/usn-382-1 Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA06-312A.html Patch US Government Resource
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/4387
http://www.vupen.com/english/advisories/2007/1198
http://www.vupen.com/english/advisories/2008/0083
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
https://bugzilla.mozilla.org/show_bug.cgi?id=355569
https://exchange.xforce.ibmcloud.com/vulnerabilities/30093
https://issues.rpath.com/browse/RPL-765
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11496
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P Patch
http://rhn.redhat.com/errata/RHSA-2006-0733.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0734.html Patch Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0735.html Patch Vendor Advisory
http://secunia.com/advisories/22066
http://secunia.com/advisories/22722 Patch Vendor Advisory
http://secunia.com/advisories/22727 Patch Vendor Advisory
http://secunia.com/advisories/22737 Patch Vendor Advisory
http://secunia.com/advisories/22763 Patch Vendor Advisory
http://secunia.com/advisories/22770 Patch Vendor Advisory
http://secunia.com/advisories/22774 Patch Vendor Advisory
http://secunia.com/advisories/22815
http://secunia.com/advisories/22817 Patch Vendor Advisory
http://secunia.com/advisories/22929 Patch Vendor Advisory
http://secunia.com/advisories/22965 Patch Vendor Advisory
http://secunia.com/advisories/22980 Patch Vendor Advisory
http://secunia.com/advisories/23009 Patch Vendor Advisory
http://secunia.com/advisories/23013 Patch Vendor Advisory
http://secunia.com/advisories/23263 Patch Vendor Advisory
http://secunia.com/advisories/23287 Patch Vendor Advisory
http://secunia.com/advisories/23297 Patch Vendor Advisory
http://secunia.com/advisories/24711
http://security.gentoo.org/glsa/glsa-200612-06.xml Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200612-07.xml Patch Vendor Advisory
http://security.gentoo.org/glsa/glsa-200612-08.xml Patch Vendor Advisory
http://securitytracker.com/id?1017177 Patch
http://securitytracker.com/id?1017178 Patch
http://securitytracker.com/id?1017179 Patch
http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/815432 Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:205
http://www.mandriva.com/security/advisories?name=MDKSA-2006:206
http://www.mozilla.org/security/announce/2006/mfsa2006-65.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_68_mozilla.html Patch Vendor Advisory
http://www.securityfocus.com/archive/1/451099/100/0/threaded
http://www.securityfocus.com/bid/20957
http://www.ubuntu.com/usn/usn-381-1 Patch Vendor Advisory
http://www.ubuntu.com/usn/usn-382-1 Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA06-312A.html Patch US Government Resource
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2006/4387
http://www.vupen.com/english/advisories/2007/1198
http://www.vupen.com/english/advisories/2008/0083
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
https://bugzilla.mozilla.org/show_bug.cgi?id=355569
https://exchange.xforce.ibmcloud.com/vulnerabilities/30093
https://issues.rpath.com/browse/RPL-765
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11496
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:20

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - Patch () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - Patch
References () http://rhn.redhat.com/errata/RHSA-2006-0733.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0733.html - Patch, Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2006-0734.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0734.html - Patch, Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2006-0735.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0735.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/22066 - () http://secunia.com/advisories/22066 -
References () http://secunia.com/advisories/22722 - Patch, Vendor Advisory () http://secunia.com/advisories/22722 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22727 - Patch, Vendor Advisory () http://secunia.com/advisories/22727 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22737 - Patch, Vendor Advisory () http://secunia.com/advisories/22737 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22763 - Patch, Vendor Advisory () http://secunia.com/advisories/22763 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22770 - Patch, Vendor Advisory () http://secunia.com/advisories/22770 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22774 - Patch, Vendor Advisory () http://secunia.com/advisories/22774 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22815 - () http://secunia.com/advisories/22815 -
References () http://secunia.com/advisories/22817 - Patch, Vendor Advisory () http://secunia.com/advisories/22817 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22929 - Patch, Vendor Advisory () http://secunia.com/advisories/22929 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22965 - Patch, Vendor Advisory () http://secunia.com/advisories/22965 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22980 - Patch, Vendor Advisory () http://secunia.com/advisories/22980 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23009 - Patch, Vendor Advisory () http://secunia.com/advisories/23009 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23013 - Patch, Vendor Advisory () http://secunia.com/advisories/23013 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23263 - Patch, Vendor Advisory () http://secunia.com/advisories/23263 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23287 - Patch, Vendor Advisory () http://secunia.com/advisories/23287 - Patch, Vendor Advisory
References () http://secunia.com/advisories/23297 - Patch, Vendor Advisory () http://secunia.com/advisories/23297 - Patch, Vendor Advisory
References () http://secunia.com/advisories/24711 - () http://secunia.com/advisories/24711 -
References () http://security.gentoo.org/glsa/glsa-200612-06.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200612-06.xml - Patch, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200612-07.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200612-07.xml - Patch, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200612-08.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200612-08.xml - Patch, Vendor Advisory
References () http://securitytracker.com/id?1017177 - Patch () http://securitytracker.com/id?1017177 - Patch
References () http://securitytracker.com/id?1017178 - Patch () http://securitytracker.com/id?1017178 - Patch
References () http://securitytracker.com/id?1017179 - Patch () http://securitytracker.com/id?1017179 - Patch
References () http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm - Patch, Vendor Advisory () http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/815432 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/815432 - Patch, US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:205 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:205 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:206 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:206 -
References () http://www.mozilla.org/security/announce/2006/mfsa2006-65.html - Vendor Advisory () http://www.mozilla.org/security/announce/2006/mfsa2006-65.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_68_mozilla.html - Patch, Vendor Advisory () http://www.novell.com/linux/security/advisories/2006_68_mozilla.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/451099/100/0/threaded - () http://www.securityfocus.com/archive/1/451099/100/0/threaded -
References () http://www.securityfocus.com/bid/20957 - () http://www.securityfocus.com/bid/20957 -
References () http://www.ubuntu.com/usn/usn-381-1 - Patch, Vendor Advisory () http://www.ubuntu.com/usn/usn-381-1 - Patch, Vendor Advisory
References () http://www.ubuntu.com/usn/usn-382-1 - Patch, Vendor Advisory () http://www.ubuntu.com/usn/usn-382-1 - Patch, Vendor Advisory
References () http://www.us-cert.gov/cas/techalerts/TA06-312A.html - Patch, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-312A.html - Patch, US Government Resource
References () http://www.vupen.com/english/advisories/2006/3748 - () http://www.vupen.com/english/advisories/2006/3748 -
References () http://www.vupen.com/english/advisories/2006/4387 - () http://www.vupen.com/english/advisories/2006/4387 -
References () http://www.vupen.com/english/advisories/2007/1198 - () http://www.vupen.com/english/advisories/2007/1198 -
References () http://www.vupen.com/english/advisories/2008/0083 - () http://www.vupen.com/english/advisories/2008/0083 -
References () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 - () http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=355569 - () https://bugzilla.mozilla.org/show_bug.cgi?id=355569 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30093 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30093 -
References () https://issues.rpath.com/browse/RPL-765 - () https://issues.rpath.com/browse/RPL-765 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11496 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11496 -

Information

Published : 2006-11-08 21:07

Updated : 2024-11-21 00:20


NVD link : CVE-2006-5747

Mitre link : CVE-2006-5747

CVE.ORG link : CVE-2006-5747


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • seamonkey