Vulnerability Name: CVE-2006-1723 (CCN-25821) Assigned: 2006-04-13 Published: 2006-04-13 Updated: 2018-10-18 Summary: Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors related to DHTML. Note : due to the lack of sufficient public details from the vendor as of 20060413, it is unclear how CVE-2006-1529 , CVE-2006-1530 , CVE-2006-1531 , and CVE-2006-1723 are different. This vulnerability is addressed in the following product releases:
Mozilla, Firefox, 1.5.0.2
Mozilla, Thunderbird, 1.5.0.2
Mozilla, SeaMonkey, 1.0.1
CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: SCO Type: UNKNOWNSCOSA-2006.26 Source: MITRE Type: CNACVE-2006-1529 Source: MITRE Type: CNACVE-2006-1530 Source: MITRE Type: CNACVE-2006-1531 Source: MITRE Type: CNACVE-2006-1723 Source: CCN Type: RHSA-2006-0328firefox security update Source: CCN Type: RHSA-2006-0329mozilla security update Source: CCN Type: RHSA-2006-0330thunderbird security update Source: CCN Type: SA19631Firefox Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN19631 Source: CCN Type: SA19649Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN19649 Source: SECUNIA Type: UNKNOWN19863 Source: SECUNIA Type: UNKNOWN19941 Source: SECUNIA Type: UNKNOWN21033 Source: SECUNIA Type: UNKNOWN22065 Source: SECUNIA Type: UNKNOWN22066 Source: CCN Type: SECTRACK ID: 1015919Mozilla Seamonkey Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1015919 Source: CCN Type: SECTRACK ID: 1015920Mozilla Thunderbird Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1015920 Source: CCN Type: SECTRACK ID: 1015921Mozilla Firefox Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1015921 Source: CCN Type: Sun Alert ID: 102550Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux Source: CCN Type: ASA-2006-085Mozilla Firefox and Thunderbird security update (RHSA-2006-0328 RHSA-2006-0329 RHSA-2006-330) Source: CCN Type: ASA-2006-259HP-UX Firefox Vulnerabilities Source: CCN Type: ASA-2007-097HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153) Source: CCN Type: ASA-2007-135HP-UX Running Thunderbird Remote Unauthorized Access or Elevation of Privileges or Denial of Service (HPSBUX02156) Source: DEBIAN Type: UNKNOWNDSA-1046 Source: DEBIAN Type: UNKNOWNDSA-1051 Source: DEBIAN Type: DSA-1046mozilla -- several vulnerabilities Source: DEBIAN Type: DSA-1051mozilla-thunderbird -- several vulnerabilities Source: CCN Type: US-CERT VU#350262Mozilla DHTML memory corruption vulnerabilities Source: CERT-VN Type: US Government ResourceVU#350262 Source: CCN Type: Mozilla Web siteFirefox - Rediscover the Web Source: CCN Type: MFSA 2006-20Crashes with evidence of memory corruption Source: CONFIRM Type: UNKNOWNhttp://www.mozilla.org/security/announce/2006/mfsa2006-20.html Source: CCN Type: OSVDB ID: 24673Mozilla Multiple Products DHTML Unspecified Memory Corruption (315254) Source: CCN Type: OSVDB ID: 24674Mozilla Multiple Products DHTML Unspecified Memory Corruption (326615) Source: CCN Type: OSVDB ID: 24675Mozilla Multiple Products DHTML Unspecified Memory Corruption (326834) Source: CCN Type: OSVDB ID: 24676Mozilla Multiple Products DHTML Unspecified Memory Corruption (327941) Source: HP Type: UNKNOWNSSRT061236 Source: HP Type: UNKNOWNSSRT061181 Source: BID Type: UNKNOWN17516 Source: CCN Type: BID-17516Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities Source: VUPEN Type: UNKNOWNADV-2006-1356 Source: VUPEN Type: UNKNOWNADV-2006-3748 Source: VUPEN Type: UNKNOWNADV-2006-3749 Source: VUPEN Type: UNKNOWNADV-2008-0083 Source: XF Type: UNKNOWNmozilla-dhtml-memory-corruption(25821) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:1574 Vulnerable Configuration: Configuration 1 :cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:preview_release:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:firefox:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.11:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.10:*:*:*:*:*:*:* OR cpe:/a:mozilla:mozilla_suite:1.7.12:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::beta:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:* AND cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
mozilla firefox 1.0
mozilla firefox 1.0.1
mozilla firefox 1.0.2
mozilla firefox 1.0.3
mozilla firefox 1.0.4
mozilla firefox 1.0.5
mozilla firefox 1.0.6
mozilla firefox 1.0.7
mozilla firefox 1.5
mozilla firefox 1.5 beta1
mozilla firefox 1.5 beta2
mozilla firefox 1.5.0.1
mozilla firefox preview_release
mozilla seamonkey 1.0
mozilla seamonkey 1.0 beta
mozilla thunderbird 1.0
mozilla thunderbird 1.0.1
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.3
mozilla thunderbird 1.0.4
mozilla thunderbird 1.0.5
mozilla thunderbird 1.0.5 beta
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla thunderbird 1.5.0.1
mozilla firefox 1.0
mozilla thunderbird 1.0.1
mozilla mozilla suite 1.7.6
mozilla firefox 1.0.1
mozilla firefox 1.0.2
mozilla firefox 1.0.3
mozilla mozilla suite 1.7.7
mozilla firefox 1.0.4
mozilla mozilla suite 1.7.8
mozilla firefox 1.0.6
mozilla firefox 1.5 beta1
mozilla mozilla suite 1.7.11
mozilla firefox 1.0.7
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla firefox 1.5
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla thunderbird 1.5.0.1
mozilla firefox 1.0.5
mozilla firefox 1.5.0.1
mozilla firefox 1.5 beta2
mozilla mozilla suite 1.7.10
mozilla mozilla suite 1.7.12
mozilla thunderbird 1.0
mozilla thunderbird 1.0.3
mozilla thunderbird 1.0.4
mozilla thunderbird 1.0.5
mozilla seamonkey 1.0
mozilla seamonkey 1.0
mozilla thunderbird 1.0.5 beta
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
redhat linux advanced workstation 2.1