CVE-2006-3811

Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
References
Link Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html Vendor Advisory
http://www.kb.cert.org/vuls/id/527676 US Government Resource
https://issues.rpath.com/browse/RPL-536
http://www.securityfocus.com/bid/19181 Patch
http://securitytracker.com/id?1016586
http://securitytracker.com/id?1016587
http://securitytracker.com/id?1016588
http://secunia.com/advisories/19873 Patch Vendor Advisory
http://secunia.com/advisories/21216 Patch Vendor Advisory
http://secunia.com/advisories/21228 Patch Vendor Advisory
http://secunia.com/advisories/21229 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0608.html
http://www.us-cert.gov/cas/techalerts/TA06-208A.html US Government Resource
http://secunia.com/advisories/21246
http://www.redhat.com/support/errata/RHSA-2006-0610.html
http://www.redhat.com/support/errata/RHSA-2006-0611.html
http://secunia.com/advisories/21243
http://secunia.com/advisories/21269
http://secunia.com/advisories/21270
http://secunia.com/advisories/21275
http://security.gentoo.org/glsa/glsa-200608-02.xml
http://security.gentoo.org/glsa/glsa-200608-04.xml
http://rhn.redhat.com/errata/RHSA-2006-0609.html
http://secunia.com/advisories/21336 Vendor Advisory
http://secunia.com/advisories/21358 Vendor Advisory
http://secunia.com/advisories/21361 Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
https://issues.rpath.com/browse/RPL-537
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc Vendor Advisory
http://secunia.com/advisories/21250 Vendor Advisory
http://secunia.com/advisories/21262 Vendor Advisory
http://secunia.com/advisories/21343 Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html
http://secunia.com/advisories/21529 Vendor Advisory
http://secunia.com/advisories/21532
http://secunia.com/advisories/21607
http://www.redhat.com/support/errata/RHSA-2006-0594.html
http://secunia.com/advisories/21631
http://www.debian.org/security/2006/dsa-1161
http://secunia.com/advisories/21675
http://www.ubuntu.com/usn/usn-350-1
http://www.ubuntu.com/usn/usn-354-1
http://secunia.com/advisories/22055
http://secunia.com/advisories/22210
http://www.ubuntu.com/usn/usn-361-1
http://secunia.com/advisories/22342
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1
http://secunia.com/advisories/22065
http://secunia.com/advisories/22066
http://secunia.com/advisories/25839
http://www.vupen.com/english/advisories/2006/3749
http://www.vupen.com/english/advisories/2006/3748
http://www.vupen.com/english/advisories/2007/2350
http://www.vupen.com/english/advisories/2008/0083
http://www.vupen.com/english/advisories/2006/2998
https://exchange.xforce.ibmcloud.com/vulnerabilities/27992
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934
https://usn.ubuntu.com/329-1/
https://usn.ubuntu.com/327-1/
http://www.securityfocus.com/archive/1/446658/100/200/threaded
http://www.securityfocus.com/archive/1/446657/100/200/threaded
http://www.securityfocus.com/archive/1/441333/100/0/threaded
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*

Information

Published : 2006-07-27 13:04

Updated : 2018-10-17 14:31


NVD link : CVE-2006-3811

Mitre link : CVE-2006-3811


JSON object : View

Advertisement

dedicated server usa

Products Affected

mozilla

  • firefox
  • seamonkey
  • thunderbird