Vulnerability Name: | CVE-2006-0749 (CCN-25819) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2006-04-14 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2006-04-14 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-19 | ||||||||||||||||||||||||||||||||||||||||
Summary: | nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: SCO Type: Third Party Advisory SCOSA-2006.26 Source: SGI Type: Broken Link 20060404-01-U Source: MITRE Type: CNA CVE-2006-0749 Source: SUSE Type: Broken Link SUSE-SA:2006:021 Source: CCN Type: RHSA-2006-0328 firefox security update Source: CCN Type: RHSA-2006-0329 mozilla security update Source: CCN Type: RHSA-2006-0330 thunderbird security update Source: CCN Type: SA19631 Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 19631 Source: SECUNIA Type: Third Party Advisory 19696 Source: SECUNIA Type: Third Party Advisory 19714 Source: SECUNIA Type: Third Party Advisory 19721 Source: SECUNIA Type: Third Party Advisory 19729 Source: SECUNIA Type: Third Party Advisory 19746 Source: SECUNIA Type: Third Party Advisory 19759 Source: SECUNIA Type: Third Party Advisory 19780 Source: SECUNIA Type: Third Party Advisory 19794 Source: SECUNIA Type: Third Party Advisory 19811 Source: SECUNIA Type: Third Party Advisory 19821 Source: SECUNIA Type: Third Party Advisory 19823 Source: SECUNIA Type: Third Party Advisory 19852 Source: SECUNIA Type: Third Party Advisory 19862 Source: SECUNIA Type: Third Party Advisory 19863 Source: SECUNIA Type: Third Party Advisory 19902 Source: SECUNIA Type: Third Party Advisory 19941 Source: SECUNIA Type: Third Party Advisory 19950 Source: SECUNIA Type: Third Party Advisory 20051 Source: SECUNIA Type: Third Party Advisory 21033 Source: SECUNIA Type: Third Party Advisory 21622 Source: SREASON Type: Third Party Advisory 729 Source: CCN Type: Sun Alert ID: 102550 Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux Source: SUNALERT Type: Broken Link 102550 Source: SUNALERT Type: Broken Link 228526 Source: CCN Type: ASA-2006-085 Mozilla Firefox and Thunderbird security update (RHSA-2006-0328 RHSA-2006-0329 RHSA-2006-330) Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm Source: DEBIAN Type: Third Party Advisory DSA-1044 Source: DEBIAN Type: Third Party Advisory DSA-1046 Source: DEBIAN Type: Third Party Advisory DSA-1051 Source: DEBIAN Type: DSA-1044 mozilla-firefox -- several vulnerabilities Source: DEBIAN Type: DSA-1046 mozilla -- several vulnerabilities Source: DEBIAN Type: DSA-1051 mozilla-thunderbird -- several vulnerabilities Source: CCN Type: GLSA-200604-12 Mozilla Firefox: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200604-12 Source: CCN Type: GLSA-200604-18 Mozilla Suite: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200604-18 Source: CCN Type: GLSA-200605-09 Mozilla Thunderbird: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200605-09 Source: CCN Type: US-CERT VU#736934 Mozilla products vulnerable to memory corruption via a particular sequence of HTML tags Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#736934 Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:075 Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:076 Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:078 Source: CCN Type: Mozilla Web site Firefox - Rediscover the Web Source: CCN Type: MFSA 2006-18 Mozilla Firefox Tag Order Vulnerability Source: CONFIRM Type: Vendor Advisory http://www.mozilla.org/security/announce/2006/mfsa2006-18.html Source: SUSE Type: Broken Link SUSE-SA:2006:022 Source: FEDORA Type: Third Party Advisory FEDORA-2006-410 Source: FEDORA Type: Third Party Advisory FEDORA-2006-411 Source: REDHAT Type: Third Party Advisory RHSA-2006:0328 Source: REDHAT Type: Third Party Advisory RHSA-2006:0329 Source: REDHAT Type: Third Party Advisory RHSA-2006:0330 Source: BUGTRAQ Type: UNKNOWN 20060417 ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability Source: HP Type: UNKNOWN SSRT061145 Source: FEDORA Type: UNKNOWN FLSA:189137-1 Source: FEDORA Type: UNKNOWN FLSA:189137-2 Source: HP Type: UNKNOWN HPSBUX02122 Source: BID Type: Third Party Advisory, VDB Entry 17516 Source: CCN Type: BID-17516 Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities Source: CCN Type: USN-271-1 Firefox vulnerabilities Source: CCN Type: USN-275-1 Mozilla vulnerabilities Source: CCN Type: USN-276-1 Thunderbird vulnerabilities Source: CERT Type: Third Party Advisory, US Government Resource TA06-107A Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-1356 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3391 Source: MISC Type: Third Party Advisory, VDB Entry http://www.zerodayinitiative.com/advisories/ZDI-06-009.html Source: XF Type: Third Party Advisory, VDB Entry mozilla-nshtmlcontentsink-memory-corruption(25819) Source: XF Type: UNKNOWN mozilla-nshtmlcontentsink-memory-corruption(25819) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:11704 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:1848 Source: UBUNTU Type: UNKNOWN USN-271-1 Source: UBUNTU Type: UNKNOWN USN-275-1 Source: UBUNTU Type: UNKNOWN USN-276-1 Source: SUSE Type: SUSE-SA:2006:021 Mozilla Firefox and Mozilla suite various security problems Source: SUSE Type: SUSE-SA:2006:022 MozillaThunderbird various problems Source: CCN Type: ZDI-06-009 Mozilla Firefox Tag Parsing Code Execution Vulnerability | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |