Added: 08/14/2006
CVE: CVE-2006-3677
BID: 19192
OSVDB: 27559
When used in a web page, Java references properties of the **window.navigator**
object as it starts up in Firefox or SeaMonkey.
If a web page replaces the navigator object before starting Java, then the page could cause the browser to crash in a way that allows arbitrary command execution.
Upgrade to Firefox 1.5.0.5 or higher or SeaMonkey 1.0.3 or higher.
<http://www.mozilla.org/security/announce/2006/mfsa2006-45.html>
Exploit works on Firefox 1.5.0.4 and requires a user to click on the Exploit button. The Java plug-in must be installed in order for the exploit to succeed. Firefox’s automatic update feature must be disabled in order for the exploit to succeed. Note that it may take several minutes for this exploit to succeed because a large amount of memory must be allocated on the target.
Windows 2000
Windows XP SP2
Linux
Ubuntu Linux