Lucene search

K
certCERTVU:714496
HistoryNov 08, 2006 - 12:00 a.m.

Mozilla products allow execution of arbitrary JavaScript

2006-11-0800:00:00
www.kb.cert.org
19

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.46 Medium

EPSS

Percentile

97.4%

Overview

Multiple Mozilla products allow running JavaScript to be recompiled while executing. This vulnerability may allow a remote attacker to execute arbitrary JavaScript bytecode.

Description

According to Mozilla Foundation Security Advisory 2006-67:

_…_it was possible to modify a Script object while it was executing, potentially leading to the execution of arbitrary JavaScript bytecode.
This vulnerability requires JavaScript to be enabled. JavaScript is enabled by default in the Firefox web browser, but not in the Mozilla Thunderbird email client.

Note that this issue affects Mozilla Firefox, Thunderbird, and SeaMonkey. For more information refer to Mozilla Foundation Security Advisory 2006-67.


Impact

A remote, unauthenticated attacker may be able to execute arbitrary JavaScript bytecode.


Solution

Apply an update
According to the Mozilla Foundation Security Update 2006-67, this vulnerability is addressed in Firefox 1.5.0.8, Thunderbird 1.5.0.8, and SeaMonkey 1.0.6.


Disable JavaScript

For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.


Vendor Information

714496

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Updated: November 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to <http://www.mozilla.org/security/announce/2006/mfsa2006-67.html&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23714496 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Mozilla Foundation Security Advisory 2006-67. Mozilla credits shutdown for providing information concerning this issue.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-5463
Severity Metric: 14.04 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.46 Medium

EPSS

Percentile

97.4%