[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4253Date: (C)2006-08-21   (M)2024-02-22


Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.6
Exploit Score: 4.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016846
SECTRACK-1016847
SECTRACK-1016848
BID-19488
BID-19534
http://www.securityfocus.com/archive/1/443020/100/100/threaded
http://www.securityfocus.com/archive/1/443306/100/100/threaded
http://www.securityfocus.com/archive/1/443528/100/0/threaded
http://www.securityfocus.com/archive/1/443500/100/100/threaded
20060901-01-P
http://www.securityfocus.com/archive/1/446140/100/0/threaded
http://www.securityfocus.com/archive/1/447840/100/200/threaded
http://www.securityfocus.com/archive/1/447837/100/200/threaded
http://www.securityfocus.com/archive/1/448956/100/100/threaded
http://www.securityfocus.com/archive/1/448984/100/100/threaded
http://www.securityfocus.com/archive/1/449245/100/100/threaded
http://www.securityfocus.com/archive/1/449487/100/0/threaded
http://www.securityfocus.com/archive/1/449726/100/0/threaded
SECUNIA-21513
SECUNIA-21906
SECUNIA-21915
SECUNIA-21916
SECUNIA-21939
SECUNIA-21940
SECUNIA-21949
SECUNIA-21950
SECUNIA-22001
SECUNIA-22025
SECUNIA-22036
SECUNIA-22055
SECUNIA-22056
SECUNIA-22066
SECUNIA-22074
SECUNIA-22088
SECUNIA-22195
SECUNIA-22210
SECUNIA-22274
SECUNIA-22391
SECUNIA-22422
SECUNIA-24711
ADV-2006-3617
ADV-2006-3748
ADV-2007-1198
ADV-2008-0083
GLSA-200609-19
GLSA-200610-01
GLSA-200610-04
MDKSA-2006:168
MDKSA-2006:169
RHSA-2006:0675
RHSA-2006:0676
RHSA-2006:0677
SSRT061181
SUSE-SA:2006:054
USN-350-1
USN-351-1
USN-352-1
USN-354-1
http://lcamtuf.coredump.cx/ffoxdie.html
http://lcamtuf.coredump.cx/ffoxdie3.html
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
http://www.mozilla.org/security/announce/2006/mfsa2006-59.html
http://www.pianetapc.it/view.php?id=770
http://www.securiteam.com/securitynews/5VP0M0AJFW.html
https://bugzilla.mozilla.org/show_bug.cgi?id=348514
https://issues.rpath.com/browse/RPL-640
oval:org.mitre.oval:def:9528

CWE    1
CWE-264

© SecPod Technologies