Lucene search

K
cveRedhatCVE-2006-1736
HistoryApr 14, 2006 - 10:02 a.m.

CVE-2006-1736

2006-04-1410:02:00
redhat
web.nvd.nist.gov
54
cve-2006-1736
mozilla firefox
mozilla suite
remote attackers
download trick
executable file
security vulnerability

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

AI Score

6

Confidence

Low

EPSS

0.218

Percentile

96.5%

Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the “Save image as…” option. NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is extra whitespace in the filename.

Affected configurations

Nvd
Node
mozillafirefoxRange1.0.7
OR
mozillafirefoxMatch1.0
OR
mozillafirefoxMatch1.0.1
OR
mozillafirefoxMatch1.0.2
OR
mozillafirefoxMatch1.0.3
OR
mozillafirefoxMatch1.0.4
OR
mozillafirefoxMatch1.0.5
OR
mozillafirefoxMatch1.0.6
OR
mozillafirefoxMatch1.5
OR
mozillafirefoxMatch1.5beta1
OR
mozillafirefoxMatch1.5beta2
OR
mozillamozilla_suiteRange1.7.12
OR
mozillamozilla_suiteMatch1.7.6
OR
mozillamozilla_suiteMatch1.7.7
OR
mozillamozilla_suiteMatch1.7.8
OR
mozillamozilla_suiteMatch1.7.10
OR
mozillamozilla_suiteMatch1.7.11
OR
mozillaseamonkeyRange1.0beta
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillathunderbirdRange1.0.7
OR
mozillathunderbirdMatch1.0
OR
mozillathunderbirdMatch1.0.1
OR
mozillathunderbirdMatch1.0.2
OR
mozillathunderbirdMatch1.0.3
OR
mozillathunderbirdMatch1.0.4
OR
mozillathunderbirdMatch1.0.5
OR
mozillathunderbirdMatch1.0.5beta
OR
mozillathunderbirdMatch1.0.6
OR
mozillathunderbirdMatch1.5
OR
mozillathunderbirdMatch1.5beta2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox1.0cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
mozillafirefox1.0.1cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
mozillafirefox1.0.2cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
mozillafirefox1.0.3cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
mozillafirefox1.0.4cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
mozillafirefox1.0.5cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
mozillafirefox1.0.6cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
mozillafirefox1.5cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
mozillafirefox1.5cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*
Rows per page:
1-10 of 301

References

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

AI Score

6

Confidence

Low

EPSS

0.218

Percentile

96.5%