CVE-2006-6498

Multiple unspecified vulnerabilities in the JavaScript engine for Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, SeaMonkey before 1.0.7, and Mozilla 1.7 and probably earlier on Solaris, allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown impact and attack vectors.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://fedoranews.org/cms/node/2297
http://fedoranews.org/cms/node/2338
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://rhn.redhat.com/errata/RHSA-2006-0758.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0759.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0760.html Vendor Advisory
http://secunia.com/advisories/23282 Vendor Advisory
http://secunia.com/advisories/23420 Vendor Advisory
http://secunia.com/advisories/23422 Vendor Advisory
http://secunia.com/advisories/23433 Vendor Advisory
http://secunia.com/advisories/23439 Vendor Advisory
http://secunia.com/advisories/23440 Vendor Advisory
http://secunia.com/advisories/23468 Vendor Advisory
http://secunia.com/advisories/23514 Vendor Advisory
http://secunia.com/advisories/23545 Vendor Advisory
http://secunia.com/advisories/23589 Vendor Advisory
http://secunia.com/advisories/23591 Vendor Advisory
http://secunia.com/advisories/23601 Vendor Advisory
http://secunia.com/advisories/23614 Vendor Advisory
http://secunia.com/advisories/23618 Vendor Advisory
http://secunia.com/advisories/23672 Vendor Advisory
http://secunia.com/advisories/23692 Vendor Advisory
http://secunia.com/advisories/23988 Vendor Advisory
http://secunia.com/advisories/24078 Vendor Advisory
http://secunia.com/advisories/24390 Vendor Advisory
http://secunia.com/advisories/25556 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200701-02.xml
http://securitytracker.com/id?1017398
http://securitytracker.com/id?1017405
http://securitytracker.com/id?1017406
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1
http://www.debian.org/security/2007/dsa-1253
http://www.debian.org/security/2007/dsa-1258
http://www.debian.org/security/2007/dsa-1265
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
http://www.kb.cert.org/vuls/id/427972 US Government Resource
http://www.kb.cert.org/vuls/id/447772 US Government Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-68.html
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
http://www.securityfocus.com/archive/1/455145/100/0/threaded
http://www.securityfocus.com/archive/1/455728/100/200/threaded
http://www.securityfocus.com/bid/21668
http://www.ubuntu.com/usn/usn-398-1
http://www.ubuntu.com/usn/usn-398-2
http://www.ubuntu.com/usn/usn-400-1
http://www.us-cert.gov/cas/techalerts/TA06-354A.html US Government Resource
http://www.vupen.com/english/advisories/2006/5068
http://www.vupen.com/english/advisories/2007/2106
http://www.vupen.com/english/advisories/2008/0083
https://issues.rpath.com/browse/RPL-883
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10661
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://fedoranews.org/cms/node/2297
http://fedoranews.org/cms/node/2338
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://rhn.redhat.com/errata/RHSA-2006-0758.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0759.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2006-0760.html Vendor Advisory
http://secunia.com/advisories/23282 Vendor Advisory
http://secunia.com/advisories/23420 Vendor Advisory
http://secunia.com/advisories/23422 Vendor Advisory
http://secunia.com/advisories/23433 Vendor Advisory
http://secunia.com/advisories/23439 Vendor Advisory
http://secunia.com/advisories/23440 Vendor Advisory
http://secunia.com/advisories/23468 Vendor Advisory
http://secunia.com/advisories/23514 Vendor Advisory
http://secunia.com/advisories/23545 Vendor Advisory
http://secunia.com/advisories/23589 Vendor Advisory
http://secunia.com/advisories/23591 Vendor Advisory
http://secunia.com/advisories/23601 Vendor Advisory
http://secunia.com/advisories/23614 Vendor Advisory
http://secunia.com/advisories/23618 Vendor Advisory
http://secunia.com/advisories/23672 Vendor Advisory
http://secunia.com/advisories/23692 Vendor Advisory
http://secunia.com/advisories/23988 Vendor Advisory
http://secunia.com/advisories/24078 Vendor Advisory
http://secunia.com/advisories/24390 Vendor Advisory
http://secunia.com/advisories/25556 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200701-02.xml
http://securitytracker.com/id?1017398
http://securitytracker.com/id?1017405
http://securitytracker.com/id?1017406
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1
http://www.debian.org/security/2007/dsa-1253
http://www.debian.org/security/2007/dsa-1258
http://www.debian.org/security/2007/dsa-1265
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
http://www.kb.cert.org/vuls/id/427972 US Government Resource
http://www.kb.cert.org/vuls/id/447772 US Government Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-68.html
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
http://www.securityfocus.com/archive/1/455145/100/0/threaded
http://www.securityfocus.com/archive/1/455728/100/200/threaded
http://www.securityfocus.com/bid/21668
http://www.ubuntu.com/usn/usn-398-1
http://www.ubuntu.com/usn/usn-398-2
http://www.ubuntu.com/usn/usn-400-1
http://www.us-cert.gov/cas/techalerts/TA06-354A.html US Government Resource
http://www.vupen.com/english/advisories/2006/5068
http://www.vupen.com/english/advisories/2007/2106
http://www.vupen.com/english/advisories/2008/0083
https://issues.rpath.com/browse/RPL-883
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10661
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:22

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc -
References () http://fedoranews.org/cms/node/2297 - () http://fedoranews.org/cms/node/2297 -
References () http://fedoranews.org/cms/node/2338 - () http://fedoranews.org/cms/node/2338 -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 -
References () http://rhn.redhat.com/errata/RHSA-2006-0758.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0758.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2006-0759.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0759.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2006-0760.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2006-0760.html - Vendor Advisory
References () http://secunia.com/advisories/23282 - Vendor Advisory () http://secunia.com/advisories/23282 - Vendor Advisory
References () http://secunia.com/advisories/23420 - Vendor Advisory () http://secunia.com/advisories/23420 - Vendor Advisory
References () http://secunia.com/advisories/23422 - Vendor Advisory () http://secunia.com/advisories/23422 - Vendor Advisory
References () http://secunia.com/advisories/23433 - Vendor Advisory () http://secunia.com/advisories/23433 - Vendor Advisory
References () http://secunia.com/advisories/23439 - Vendor Advisory () http://secunia.com/advisories/23439 - Vendor Advisory
References () http://secunia.com/advisories/23440 - Vendor Advisory () http://secunia.com/advisories/23440 - Vendor Advisory
References () http://secunia.com/advisories/23468 - Vendor Advisory () http://secunia.com/advisories/23468 - Vendor Advisory
References () http://secunia.com/advisories/23514 - Vendor Advisory () http://secunia.com/advisories/23514 - Vendor Advisory
References () http://secunia.com/advisories/23545 - Vendor Advisory () http://secunia.com/advisories/23545 - Vendor Advisory
References () http://secunia.com/advisories/23589 - Vendor Advisory () http://secunia.com/advisories/23589 - Vendor Advisory
References () http://secunia.com/advisories/23591 - Vendor Advisory () http://secunia.com/advisories/23591 - Vendor Advisory
References () http://secunia.com/advisories/23601 - Vendor Advisory () http://secunia.com/advisories/23601 - Vendor Advisory
References () http://secunia.com/advisories/23614 - Vendor Advisory () http://secunia.com/advisories/23614 - Vendor Advisory
References () http://secunia.com/advisories/23618 - Vendor Advisory () http://secunia.com/advisories/23618 - Vendor Advisory
References () http://secunia.com/advisories/23672 - Vendor Advisory () http://secunia.com/advisories/23672 - Vendor Advisory
References () http://secunia.com/advisories/23692 - Vendor Advisory () http://secunia.com/advisories/23692 - Vendor Advisory
References () http://secunia.com/advisories/23988 - Vendor Advisory () http://secunia.com/advisories/23988 - Vendor Advisory
References () http://secunia.com/advisories/24078 - Vendor Advisory () http://secunia.com/advisories/24078 - Vendor Advisory
References () http://secunia.com/advisories/24390 - Vendor Advisory () http://secunia.com/advisories/24390 - Vendor Advisory
References () http://secunia.com/advisories/25556 - Vendor Advisory () http://secunia.com/advisories/25556 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200701-02.xml - () http://security.gentoo.org/glsa/glsa-200701-02.xml -
References () http://securitytracker.com/id?1017398 - () http://securitytracker.com/id?1017398 -
References () http://securitytracker.com/id?1017405 - () http://securitytracker.com/id?1017405 -
References () http://securitytracker.com/id?1017406 - () http://securitytracker.com/id?1017406 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102955-1 -
References () http://www.debian.org/security/2007/dsa-1253 - () http://www.debian.org/security/2007/dsa-1253 -
References () http://www.debian.org/security/2007/dsa-1258 - () http://www.debian.org/security/2007/dsa-1258 -
References () http://www.debian.org/security/2007/dsa-1265 - () http://www.debian.org/security/2007/dsa-1265 -
References () http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml - () http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml -
References () http://www.kb.cert.org/vuls/id/427972 - US Government Resource () http://www.kb.cert.org/vuls/id/427972 - US Government Resource
References () http://www.kb.cert.org/vuls/id/447772 - US Government Resource () http://www.kb.cert.org/vuls/id/447772 - US Government Resource
References () http://www.mozilla.org/security/announce/2006/mfsa2006-68.html - () http://www.mozilla.org/security/announce/2006/mfsa2006-68.html -
References () http://www.novell.com/linux/security/advisories/2006_80_mozilla.html - () http://www.novell.com/linux/security/advisories/2006_80_mozilla.html -
References () http://www.novell.com/linux/security/advisories/2007_06_mozilla.html - () http://www.novell.com/linux/security/advisories/2007_06_mozilla.html -
References () http://www.securityfocus.com/archive/1/455145/100/0/threaded - () http://www.securityfocus.com/archive/1/455145/100/0/threaded -
References () http://www.securityfocus.com/archive/1/455728/100/200/threaded - () http://www.securityfocus.com/archive/1/455728/100/200/threaded -
References () http://www.securityfocus.com/bid/21668 - () http://www.securityfocus.com/bid/21668 -
References () http://www.ubuntu.com/usn/usn-398-1 - () http://www.ubuntu.com/usn/usn-398-1 -
References () http://www.ubuntu.com/usn/usn-398-2 - () http://www.ubuntu.com/usn/usn-398-2 -
References () http://www.ubuntu.com/usn/usn-400-1 - () http://www.ubuntu.com/usn/usn-400-1 -
References () http://www.us-cert.gov/cas/techalerts/TA06-354A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-354A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/5068 - () http://www.vupen.com/english/advisories/2006/5068 -
References () http://www.vupen.com/english/advisories/2007/2106 - () http://www.vupen.com/english/advisories/2007/2106 -
References () http://www.vupen.com/english/advisories/2008/0083 - () http://www.vupen.com/english/advisories/2008/0083 -
References () https://issues.rpath.com/browse/RPL-883 - () https://issues.rpath.com/browse/RPL-883 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10661 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10661 -

Information

Published : 2006-12-20 01:28

Updated : 2024-11-21 00:22


NVD link : CVE-2006-6498

Mitre link : CVE-2006-6498

CVE.ORG link : CVE-2006-6498


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • mozilla
  • seamonkey