Vulnerability Name: | CVE-2006-5747 (CCN-30093) |
Assigned: | 2006-11-08 |
Published: | 2006-11-08 |
Updated: | 2018-10-17 |
Summary: | Unspecified vulnerability in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6 allows remote attackers to execute arbitrary code via the XML.prototype.hasOwnProperty JavaScript function. |
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: SGI Type: Patch 20061101-01-P
Source: MITRE Type: CNA CVE-2006-5747
Source: CCN Type: RHSA-2006-0733 Critical: firefox security update
Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0733
Source: CCN Type: RHSA-2006-0734 Critical: seamonkey security update
Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0734
Source: CCN Type: RHSA-2006-0735 Critical: thunderbird security update
Source: REDHAT Type: Patch, Vendor Advisory RHSA-2006:0735
Source: SECUNIA Type: UNKNOWN 22066
Source: CCN Type: SA22722 Mozilla Firefox and SeaMonkey Multiple Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 22722
Source: SECUNIA Type: Patch, Vendor Advisory 22727
Source: SECUNIA Type: Patch, Vendor Advisory 22737
Source: SECUNIA Type: Patch, Vendor Advisory 22763
Source: CCN Type: SA22770 Mozilla Thunderbird Multiple Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 22770
Source: SECUNIA Type: Patch, Vendor Advisory 22774
Source: SECUNIA Type: UNKNOWN 22815
Source: SECUNIA Type: Patch, Vendor Advisory 22817
Source: SECUNIA Type: Patch, Vendor Advisory 22929
Source: CCN Type: SA22965 Avaya Messaging Storage Server Firefox Multiple Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 22965
Source: SECUNIA Type: Patch, Vendor Advisory 22980
Source: SECUNIA Type: Patch, Vendor Advisory 23009
Source: SECUNIA Type: Patch, Vendor Advisory 23013
Source: SECUNIA Type: Patch, Vendor Advisory 23263
Source: SECUNIA Type: Patch, Vendor Advisory 23287
Source: SECUNIA Type: Patch, Vendor Advisory 23297
Source: CCN Type: SA24711 Netscape Multiple Vulnerabilities
Source: SECUNIA Type: UNKNOWN 24711
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200612-06
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200612-07
Source: GENTOO Type: Patch, Vendor Advisory GLSA-200612-08
Source: CCN Type: SECTRACK ID: 1017177 Mozilla Seamonkey Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1017177
Source: CCN Type: SECTRACK ID: 1017178 Mozilla Thunderbird Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1017178
Source: CCN Type: SECTRACK ID: 1017179 Mozilla Firefox Layout Engine, XML Method, and JavaScript Engine Memory Errors May Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1017179
Source: CCN Type: ASA-2006-244 thunderbird security update (RHSA-2006-0735)
Source: CONFIRM Type: Patch, Vendor Advisory http://support.avaya.com/elmodocs2/security/ASA-2006-246.htm
Source: CCN Type: ASA-2006-246 firefox security update (RHSA-2006-0733)
Source: CCN Type: ASA-2006-247 seamonkey security update (RHSA-2006-0734)
Source: CCN Type: ASA-2007-097 HP-UX Running Firefox Remote Unauthorized Access or Elevation of Privileges or Denial of Service (DoS) (HPSBUX02153)
Source: CCN Type: GLSA-200612-06 Mozilla Thunderbird: Multiple vulnerabilities
Source: CCN Type: GLSA-200612-07 Mozilla Firefox: Multiple vulnerabilities
Source: CCN Type: GLSA-200612-08 SeaMonkey: Multiple vulnerabilities
Source: CCN Type: US-CERT VU#815432 Mozilla XML.prototype.hasOwnProperty() method memory corruption vulnerability
Source: CERT-VN Type: Patch, US Government Resource VU#815432
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:205
Source: MANDRIVA Type: UNKNOWN MDKSA-2006:206
Source: CCN Type: MFSA 2006-65 Crashes with evidence of memory corruption (rv:1.8.0.8)
Source: CONFIRM Type: Vendor Advisory http://www.mozilla.org/security/announce/2006/mfsa2006-65.html
Source: SUSE Type: Patch, Vendor Advisory SUSE-SA:2006:068
Source: BUGTRAQ Type: UNKNOWN 20061109 rPSA-2006-0206-1 firefox thunderbird
Source: BID Type: UNKNOWN 20957
Source: CCN Type: BID-20957 Mozilla Client Products Multiple Remote Vulnerabilities
Source: CCN Type: USN-381-1 Firefox vulnerabilities
Source: UBUNTU Type: Patch, Vendor Advisory USN-381-1
Source: CCN Type: USN-382-1 Thunderbird vulnerabilities
Source: UBUNTU Type: Patch, Vendor Advisory USN-382-1
Source: CERT Type: Patch, US Government Resource TA06-312A
Source: VUPEN Type: UNKNOWN ADV-2006-3748
Source: VUPEN Type: UNKNOWN ADV-2006-4387
Source: VUPEN Type: UNKNOWN ADV-2007-1198
Source: VUPEN Type: UNKNOWN ADV-2008-0083
Source: HP Type: UNKNOWN SSRT061181
Source: MISC Type: UNKNOWN https://bugzilla.mozilla.org/show_bug.cgi?id=355569
Source: XF Type: UNKNOWN mozilla-xmlprototype-code-execution(30093)
Source: XF Type: UNKNOWN mozilla-xmlprototypehasownproperty-dos(30093)
Source: CONFIRM Type: UNKNOWN https://issues.rpath.com/browse/RPL-765
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11496
Source: SUSE Type: SUSE-SA:2006:068 Mozilla Firefox 1.5.0.8 release
|
Vulnerable Configuration: | Configuration 1: cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1: cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0::dev:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0:-:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*OR cpe:/a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
mozilla firefox 1.5
mozilla firefox 1.5 beta1
mozilla firefox 1.5 beta2
mozilla firefox 1.5.0.1
mozilla firefox 1.5.0.2
mozilla firefox 1.5.0.3
mozilla firefox 1.5.0.4
mozilla firefox 1.5.0.5
mozilla firefox 1.5.0.6
mozilla firefox 1.5.0.7
mozilla seamonkey 1.0
mozilla seamonkey 1.0
mozilla seamonkey 1.0.1
mozilla seamonkey 1.0.2
mozilla seamonkey 1.0.3
mozilla seamonkey 1.0.5
mozilla thunderbird 1.0
mozilla thunderbird 1.0.1
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.5
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla thunderbird 1.0.8
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla thunderbird 1.5.0.1
mozilla thunderbird 1.5.0.2
mozilla thunderbird 1.5.0.4
mozilla thunderbird 1.5.0.7
mozilla thunderbird 1.0.1
mozilla firefox 1.5 beta1
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla seamonkey 1.0
mozilla firefox 1.5
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla firefox 1.5.0.2
mozilla firefox 1.5.0.3
mozilla firefox 1.5.0.4
mozilla firefox 1.5.0.6
mozilla firefox 1.5.0.7
mozilla thunderbird 1.5.0.7
mozilla seamonkey 1.0.5
mozilla seamonkey 1.0.2
mozilla thunderbird 1.5.0.4
mozilla thunderbird 1.5.0.2
mozilla thunderbird 1.5.0.1
mozilla seamonkey 1.0
mozilla seamonkey 1.0.1
mozilla seamonkey 1.0.3
mozilla firefox 1.5.0.1
mozilla firefox 1.5.0.5
mozilla firefox 1.5 beta2
mozilla thunderbird 1.0
mozilla thunderbird 1.0.5
mozilla thunderbird 1.0.8
gentoo linux *
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
novell linux desktop 9
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux 2007
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 4.0
mandrakesoft mandrake linux corporate server 3.0