Lucene search

K
certCERTVU:495288
HistoryNov 08, 2006 - 12:00 a.m.

Mozilla products contain several unspecified errors in the layout engine

2006-11-0800:00:00
www.kb.cert.org
8

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.29 Low

EPSS

Percentile

96.8%

Overview

The Mozilla layout engine contains several unspecified vulnerabilities that may allow an attacker to execute arbitrary code or crash the vulnerable application.

Description

The Mozilla layout engine, also known as Gecko, is responsible for parsing HTML, XML, CSS, layout, and rendering. Gecko is the core of several applications, such as Mozilla, Firefox, Thunderbird, and SeaMonkey. The Mozilla layout engine contains several unspecified vulnerabilities that can corrupt memory and cause the application to crash. In certain cases, such crashes may be exploitable to execute arbitrary code.


Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user. An attacker may also be able to cause the affected application to crash.


Solution

Apply an update

Refer to Mozilla Foundation Security Advisory 2006-65 for fixed versions of Mozilla products. According to this advisory, Firefox 1.5.0.8, Thunderbird 1.5.0.8, and SeaMonkey 1.0.5 address this issue. Netscape Browser 8.1.3 has also been released to address this issue.


Disable JavaScript

Disabling JavaScript may help prevent these vulnerabilities from being exploited to execute arbitrary code.


Vendor Information

495288

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

America Online, Inc. __ Affected

Updated: April 05, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Netscape Browser 8.1.3 has been released to address this issue.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23495288 Feedback>).

Mozilla __ Affected

Notified: November 08, 2006 Updated: November 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to Mozilla Foundation Security Advisory 2006-65 for fixed versions of Mozilla products.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23495288 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to the Mozilla Foundation for reporting this vulnerability, who in turn credit Jesse Ruderman and Martijn Wargers.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2006-5464
Severity Metric: 3.50 Date Public:

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.29 Low

EPSS

Percentile

96.8%