CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
96.9%
The Mozilla layout engine contains several unspecified vulnerabilities that may allow an attacker to execute arbitrary code or crash the vulnerable application.
The Mozilla layout engine, also known as Gecko, is responsible for parsing HTML, XML, CSS, layout, and rendering. Gecko is the core of several applications, such as Mozilla, Firefox, Thunderbird, and SeaMonkey. The Mozilla layout engine contains several unspecified vulnerabilities that can corrupt memory and cause the application to crash. In certain cases, such crashes may be exploitable to execute arbitrary code.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user. An attacker may also be able to cause the affected application to crash.
Apply an update
Refer to Mozilla Foundation Security Advisory 2006-65 for fixed versions of Mozilla products. According to this advisory, Firefox 1.5.0.8, Thunderbird 1.5.0.8, and SeaMonkey 1.0.5 address this issue. Netscape Browser 8.1.3 has also been released to address this issue.
Disable JavaScript
Disabling JavaScript may help prevent these vulnerabilities from being exploited to execute arbitrary code.
495288
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: April 05, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Netscape Browser 8.1.3 has been released to address this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23495288 Feedback>).
Notified: November 08, 2006 Updated: November 08, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Mozilla Foundation Security Advisory 2006-65 for fixed versions of Mozilla products.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23495288 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to the Mozilla Foundation for reporting this vulnerability, who in turn credit Jesse Ruderman and Martijn Wargers.
This document was written by Will Dormann.
CVE IDs: | CVE-2006-5464 |
---|---|
Severity Metric: | 3.50 Date Public: |
browser.netscape.com/ns8/security/alerts.jsp
secunia.com/advisories/22727/
secunia.com/advisories/22763/
secunia.com/advisories/22815/
secunia.com/advisories/22929/
secunia.com/advisories/22980/
secunia.com/advisories/23009/
secunia.com/advisories/23013/
www.mozilla.org/newlayout/
www.mozilla.org/security/announce/2006/mfsa2006-65.html
bugzilla.mozilla.org/show_bug.cgi?id=307809
bugzilla.mozilla.org/show_bug.cgi?id=310267
bugzilla.mozilla.org/show_bug.cgi?id=350370
bugzilla.mozilla.org/show_bug.cgi?id=351328