Vulnerability Name: CVE-2006-1531 (CCN-25821) Assigned: 2006-04-13 Published: 2006-04-13 Updated: 2018-10-18 Summary: Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML. Note : due to the lack of sufficient public details from the vendor as of 20060413, it is unclear how CVE-2006-1529 , CVE-2006-1530 , CVE-2006-1531 , and CVE-2006-1723 are different. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: SCO Type: Third Party AdvisorySCOSA-2006.26 Source: MITRE Type: CNACVE-2006-1529 Source: MITRE Type: CNACVE-2006-1530 Source: MITRE Type: CNACVE-2006-1531 Source: MITRE Type: CNACVE-2006-1723 Source: CCN Type: RHSA-2006-0328firefox security update Source: CCN Type: RHSA-2006-0329mozilla security update Source: CCN Type: RHSA-2006-0330thunderbird security update Source: CCN Type: SA19631Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory19631 Source: CCN Type: SA19649Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory19649 Source: SECUNIA Type: Third Party Advisory19863 Source: SECUNIA Type: Third Party Advisory19941 Source: SECUNIA Type: Third Party Advisory21033 Source: SECUNIA Type: Third Party Advisory22065 Source: SECUNIA Type: Third Party Advisory22066 Source: CCN Type: SECTRACK ID: 1015919Mozilla Seamonkey Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1015919 Source: CCN Type: SECTRACK ID: 1015920Mozilla Thunderbird Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1015920 Source: CCN Type: SECTRACK ID: 1015921Mozilla Firefox Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1015921 Source: CCN Type: Sun Alert ID: 102550Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux Source: CCN Type: ASA-2006-085Mozilla Firefox and Thunderbird security update (RHSA-2006-0328 RHSA-2006-0329 RHSA-2006-330) Source: CCN Type: ASA-2006-259HP-UX Firefox Vulnerabilities Source: CCN Type: ASA-2007-097HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153) Source: CCN Type: ASA-2007-135HP-UX Running Thunderbird Remote Unauthorized Access or Elevation of Privileges or Denial of Service (HPSBUX02156) Source: DEBIAN Type: Third Party AdvisoryDSA-1046 Source: DEBIAN Type: Third Party AdvisoryDSA-1051 Source: DEBIAN Type: DSA-1046mozilla -- several vulnerabilities Source: DEBIAN Type: DSA-1051mozilla-thunderbird -- several vulnerabilities Source: CCN Type: US-CERT VU#350262Mozilla DHTML memory corruption vulnerabilities Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#350262 Source: CCN Type: Mozilla Web siteFirefox - Rediscover the Web Source: CCN Type: MFSA 2006-20Crashes with evidence of memory corruption Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.mozilla.org/security/announce/2006/mfsa2006-20.html Source: CCN Type: OSVDB ID: 24673Mozilla Multiple Products DHTML Unspecified Memory Corruption (315254) Source: CCN Type: OSVDB ID: 24674Mozilla Multiple Products DHTML Unspecified Memory Corruption (326615) Source: CCN Type: OSVDB ID: 24675Mozilla Multiple Products DHTML Unspecified Memory Corruption (326834) Source: CCN Type: OSVDB ID: 24676Mozilla Multiple Products DHTML Unspecified Memory Corruption (327941) Source: HP Type: UNKNOWNSSRT061236 Source: HP Type: UNKNOWNSSRT061181 Source: BID Type: Third Party Advisory, VDB Entry17516 Source: CCN Type: BID-17516Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities Source: VUPEN Type: Permissions Required, Third Party AdvisoryADV-2006-3748 Source: VUPEN Type: Permissions Required, Third Party AdvisoryADV-2006-3749 Source: VUPEN Type: Permissions Required, Third Party AdvisoryADV-2008-0083 Source: MISC Type: Issue Tracking, Vendor Advisoryhttps://bugzilla.mozilla.org/show_bug.cgi?id=326834 Source: XF Type: UNKNOWNmozilla-dhtml-memory-corruption(25821) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:2023 Vulnerable Configuration: Configuration 1 :cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version < 1.5.0.2)OR cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version < 1.0.1) OR cpe:/a:mozilla:thunderbird:*:*:*:*:*:*:*:* (Version < 1.5.0.2) Configuration 2 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.12:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::beta:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
mozilla firefox *
mozilla seamonkey *
mozilla thunderbird *
debian debian linux 3.1
mozilla firefox 1.0
mozilla thunderbird 1.0.1
mozilla mozilla suite 1.7.6
mozilla firefox 1.0.1
mozilla firefox 1.0.2
mozilla firefox 1.0.3
mozilla mozilla suite 1.7.7
mozilla firefox 1.0.4
mozilla mozilla suite 1.7.8
mozilla firefox 1.0.6
mozilla firefox 1.5 beta1
mozilla mozilla suite 1.7.11
mozilla firefox 1.0.7
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla firefox 1.5
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla thunderbird 1.5.0.1
mozilla firefox 1.0.5
mozilla firefox 1.5.0.1
mozilla firefox 1.5 beta2
mozilla mozilla suite 1.7.10
mozilla mozilla suite 1.7.12
mozilla thunderbird 1.0
mozilla thunderbird 1.0.3
mozilla thunderbird 1.0.4
mozilla thunderbird 1.0.5
mozilla seamonkey 1.0
mozilla seamonkey 1.0
mozilla thunderbird 1.0.5 beta
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
redhat linux advanced workstation 2.1