Lucene search

K
mozillaMozilla FoundationMFSA2006-31
HistoryJun 01, 2006 - 12:00 a.m.

EvalInSandbox escape (Proxy Autoconfig, Greasemonkey) — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
20

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.584

Percentile

97.7%

Mozilla researcher moz_bug_r_a4 demonstrated that javascript run via EvalInSandbox can escape the sandbox and gain elevated privilege by calling valueOf() on objects created outside the sandbox and inserted into it. Malicious scripts could use these privileges to compromise your computer or data.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
OR
mozillaseamonkeyRange<1.0.2
OR
mozillathunderbirdRange<1.5.0.4
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.584

Percentile

97.7%