CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
EPSS
Percentile
91.1%
Mozilla products allow chrome URLs to reference remote files. This allows a remote attacker to execute code.
Chrome
The Mozilla user interface components outside of the content area are created using chrome. This includes toolbars, menu bars, progress bars, and window title bars. Chrome provides content, locale, and skin information for the user interface.
Chrome script
Chrome scripts have elevated privileges. Because of the extra privileges, they can perform actions that web scripts cannot. Chrome scripts also do not prompt for permission before executing potentially dangerous commands, such as creating or calling XPCOM components.
The Problem
The Mozilla foundation reports that it is possible to reference remote files using chrome URLs. If the remote file contains script, it will execute with chrome privileges.
A remote, unauthenticated attacker may be able to execute code on a vulnerable system with the privileges of the user who opened the affected browser or email application.
Note that web pages cannot link directly to chrome: resources, so there is no known way for this vulnerability to be triggered as the result of viewing a web page.
Upgrade
This issue is addressed in the 1.5.0.5 updates to Mozilla Firefox and Thunderbird, and the 1.0.3 version of Seamonkey. Refer to Mozilla Foundation Security Advisory 2006-56 for more details.
Do not Copy Untrusted Links
Do not copy or drag untrusted links that do not begin with http://, https://, or ftp://.
Disable JavaScript
Disabling JavaScript appears to prevent exploitation of this vulnerability. Instructions for disabling JavaScript can be found in the Malicious Web Scripts FAQ.
398492
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 31, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Mozilla Security Advisory 2006-56 for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23398492 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported in Mozilla Foundation Security Advisory 2006-56. Mozilla credits Benjamin Smedberg for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-3812 |
---|---|
Severity Metric: | 0.03 Date Public: |
secunia.com/advisories/19873/
secunia.com/advisories/21216/
www.cert.org/tech_tips/malicious_code_FAQ.html#mozilla1
www.mozilla.org/projects/security/components/sectalk/slide16.xml
www.mozilla.org/security/announce/2006/mfsa2006-56.html
www.mozilla.org/xpfe/ConfigChromeSpec.html
www.securityfocus.com/bid/19181
bugzilla.mozilla.org/show_bug.cgi?id=338037