Vulnerability Name: | CVE-2006-1727 (CCN-25824) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2006-04-14 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2006-04-14 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-18 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with "Print Preview". | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: SCO Type: Broken Link SCOSA-2006.26 Source: SGI Type: Broken Link 20060404-01-U Source: MITRE Type: CNA CVE-2006-1727 Source: SUSE Type: Broken Link SUSE-SA:2006:021 Source: CCN Type: RHSA-2006-0328 firefox security update Source: CCN Type: RHSA-2006-0329 mozilla security update Source: CCN Type: RHSA-2006-0330 thunderbird security update Source: CCN Type: SA19631 Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 19631 Source: CCN Type: SA19649 Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory 19649 Source: SECUNIA Type: Third Party Advisory 19696 Source: SECUNIA Type: Third Party Advisory 19714 Source: SECUNIA Type: Third Party Advisory 19721 Source: SECUNIA Type: Third Party Advisory 19729 Source: SECUNIA Type: Third Party Advisory 19746 Source: SECUNIA Type: Third Party Advisory 19759 Source: SECUNIA Type: Third Party Advisory 19780 Source: SECUNIA Type: Third Party Advisory 19811 Source: SECUNIA Type: Third Party Advisory 19821 Source: SECUNIA Type: Third Party Advisory 19823 Source: SECUNIA Type: Third Party Advisory 19852 Source: SECUNIA Type: Third Party Advisory 19862 Source: SECUNIA Type: Third Party Advisory 19863 Source: SECUNIA Type: Third Party Advisory 19902 Source: SECUNIA Type: Third Party Advisory 19941 Source: SECUNIA Type: Third Party Advisory 19950 Source: SECUNIA Type: Third Party Advisory 20051 Source: SECUNIA Type: Third Party Advisory 21033 Source: SECUNIA Type: Third Party Advisory 21622 Source: SECUNIA Type: Third Party Advisory 22065 Source: SECUNIA Type: Third Party Advisory 22066 Source: CCN Type: SECTRACK ID: 1015926 Mozilla Seamonkey XBL Control `Print Preview` Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015926 Source: CCN Type: SECTRACK ID: 1015927 Mozilla Browser Suite XBL Control `Print Preview` Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015927 Source: CCN Type: SECTRACK ID: 1015928 Mozilla Thunderbird XBL Control `Print Preview` Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015928 Source: CCN Type: SECTRACK ID: 1015929 Mozilla Firefox XBL Control `Print Preview` Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry 1015929 Source: CCN Type: Sun Alert ID: 102550 Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux Source: SUNALERT Type: Broken Link 102550 Source: SUNALERT Type: Broken Link 228526 Source: CCN Type: ASA-2006-085 Mozilla Firefox and Thunderbird security update (RHSA-2006-0328 RHSA-2006-0329 RHSA-2006-330) Source: CONFIRM Type: Third Party Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm Source: CCN Type: ASA-2006-259 HP-UX Firefox Vulnerabilities Source: CCN Type: ASA-2007-097 HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153) Source: CCN Type: ASA-2007-135 HP-UX Running Thunderbird Remote Unauthorized Access or Elevation of Privileges or Denial of Service (HPSBUX02156) Source: DEBIAN Type: Third Party Advisory DSA-1044 Source: DEBIAN Type: Third Party Advisory DSA-1046 Source: DEBIAN Type: Third Party Advisory DSA-1051 Source: DEBIAN Type: DSA-1044 mozilla-firefox -- several vulnerabilities Source: DEBIAN Type: DSA-1046 mozilla -- several vulnerabilities Source: DEBIAN Type: DSA-1051 mozilla-thunderbird -- several vulnerabilities Source: CCN Type: GLSA-200604-12 Mozilla Firefox: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200604-12 Source: CCN Type: GLSA-200604-18 Mozilla Suite: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200604-18 Source: CCN Type: GLSA-200605-09 Mozilla Thunderbird: Multiple vulnerabilities Source: GENTOO Type: Third Party Advisory GLSA-200605-09 Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:076 Source: MANDRIVA Type: Third Party Advisory MDKSA-2006:078 Source: CCN Type: Mozilla Web site Firefox - Rediscover the Web Source: CCN Type: MFSA 2006-25 Privilege escalation through Print Preview Source: CONFIRM Type: Vendor Advisory http://www.mozilla.org/security/announce/2006/mfsa2006-25.html Source: SUSE Type: Broken Link SUSE-SA:2006:022 Source: FEDORA Type: Third Party Advisory FEDORA-2006-410 Source: FEDORA Type: Third Party Advisory FEDORA-2006-411 Source: REDHAT Type: Third Party Advisory RHSA-2006:0328 Source: REDHAT Type: Third Party Advisory RHSA-2006:0329 Source: REDHAT Type: Third Party Advisory RHSA-2006:0330 Source: FEDORA Type: UNKNOWN FLSA:189137-1 Source: FEDORA Type: UNKNOWN FLSA:189137-2 Source: HP Type: UNKNOWN HPSBUX02122 Source: HP Type: UNKNOWN SSRT061236 Source: HP Type: UNKNOWN SSRT061181 Source: BID Type: Third Party Advisory, VDB Entry 17516 Source: CCN Type: BID-17516 Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities Source: CCN Type: USN-271-1 Firefox vulnerabilities Source: CCN Type: USN-275-1 Mozilla vulnerabilities Source: CCN Type: USN-276-1 Thunderbird vulnerabilities Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-1356 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3391 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3748 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2006-3749 Source: VUPEN Type: Permissions Required, Third Party Advisory ADV-2008-0083 Source: XF Type: Third Party Advisory, VDB Entry mozilla-printpreview-privilege-escalation(25824) Source: XF Type: UNKNOWN mozilla-printpreview-privilege-escalation(25824) Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:10364 Source: OVAL Type: Third Party Advisory oval:org.mitre.oval:def:1649 Source: UBUNTU Type: Third Party Advisory USN-271-1 Source: UBUNTU Type: Third Party Advisory USN-275-1 Source: UBUNTU Type: Third Party Advisory USN-276-1 Source: SUSE Type: SUSE-SA:2006:021 Mozilla Firefox and Mozilla suite various security problems Source: SUSE Type: SUSE-SA:2006:022 MozillaThunderbird various problems | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |