Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the QueryInterface method of the built-in Location and Navigator objects, which leads to memory corruption.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=319296 | patch |
http://secunia.com/advisories/18704 | third party advisory |
http://www.vupen.com/english/advisories/2006/3749 | vdb entry |
http://www.securityfocus.com/bid/16476 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1562 | vdb entry signature |
http://www.vupen.com/english/advisories/2006/0413 | vdb entry |
http://securitytracker.com/id?1015570 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24433 | vdb entry |
http://secunia.com/advisories/18700 | third party advisory |
http://www.securityfocus.com/archive/1/446657/100/200/threaded | vendor advisory |
http://www.mozilla.org/security/announce/2006/mfsa2006-04.html | |
http://www.kb.cert.org/vuls/id/759273 | third party advisory us government resource |
http://www.us-cert.gov/cas/techalerts/TA06-038A.html | third party advisory us government resource |
http://secunia.com/advisories/22065 | third party advisory |