Lucene search

K
mozillaMozilla FoundationMFSA2006-44
HistoryJul 25, 2006 - 12:00 a.m.

Code execution through deleted frame reference — Mozilla

2006-07-2500:00:00
Mozilla Foundation
www.mozilla.org
14

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.637 Medium

EPSS

Percentile

97.8%

Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away, and he demonstrated that this pointer to a deleted object could be used to execute native code supplied by the attacker.

CPENameOperatorVersion
firefoxlt1.5.0.5
seamonkeylt1.0.3

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.637 Medium

EPSS

Percentile

97.8%