CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.7%
Mozilla Firefox web browser and Thunderbird mail client contain a memory corruption vulnerability that may allow a remote attacker to execute arbitrary code.
The Mozilla Firefox QueryInterface method contains a memory corruption vulnerability. According to Mozilla:
_Calling the QueryInterface method of the built-in Location and Navigator objects causes memory corruption that might be exploitable to run arbitrary code. _
Note that JavaScript must be enabled in order for this vulnerability to exist. JavaScript is enabled by default in the Firefox and Mozilla web browsers, but not in the Mozilla’s mail client or Thunderbird. Exploitation can occur by accessing a specially crafted web page with Firefox. If JavaScript is enabled within Mozilla’s mail client or Thunderbird, then this issue may be exploitable by opening a specially crafted email.
We are aware of working exploit code for this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.
Upgrade
This issue is fixed in Firefox 1.5.0.1 and SeaMonkey 1.0.
Disable JavaScript in Firefox
Users who are unable to upgrade to a fixed version of the software are encouraged to disable JavaScript in the Firefox web browser and Thunderbird.
759273
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: February 07, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://www.mozilla.org/security/announce/mfsa2006-04.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23759273 Feedback>).
Updated: February 09, 2006
Not Affected
Vendor statement, Red Hat Inc: Not vulnerable. No Red Hat products contain Firefox 1.5.
Vendor statement, Fedora Project: Not vulnerable. No Fedora products contain Firefox 1.5.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
These vulnerabilities were reported by Georgi Guninski.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-0295 |
---|---|
Severity Metric: | 15.46 Date Public: |
secunia.com/advisories/18700
secunia.com/advisories/18704
www.frsirt.com/english/advisories/2006/0413
www.mozilla.com/firefox/releases/1.5.0.1.html
www.mozilla.org/projects/security/known-vulnerabilities.html#firefox1.5.0.1
www.mozilla.org/security/announce/mfsa2006-04.html
www.securityfocus.com/bid/16476
bugzilla.mozilla.org/show_bug.cgi?id=319296