Vulnerability Name: CVE-2006-6499 (CCN-30994) Assigned: 2006-12-19 Published: 2006-12-19 Updated: 2019-10-09 Summary: The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision. CVSS v3 Severity: 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P )3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P )1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2006-6499 Source: HP Type: Broken LinkSSRT061181 Source: CCN Type: SA23282Mozilla Firefox Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory23282 Source: CCN Type: SA23420Mozilla Thunderbird Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory23420 Source: CCN Type: SA23422Mozilla SeaMonkey Multiple Vulnerabilities Source: SECUNIA Type: Third Party Advisory23422 Source: SECUNIA Type: Third Party Advisory23545 Source: SECUNIA Type: Third Party Advisory23589 Source: SECUNIA Type: Third Party Advisory23591 Source: SECUNIA Type: Third Party Advisory23614 Source: SECUNIA Type: Third Party Advisory23672 Source: SECUNIA Type: Third Party Advisory23692 Source: SECUNIA Type: Third Party Advisory23988 Source: SECUNIA Type: Third Party Advisory24078 Source: SECUNIA Type: Third Party Advisory24390 Source: GENTOO Type: Third Party AdvisoryGLSA-200701-02 Source: CCN Type: SECTRACK ID: 1017398Mozilla Firefox Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1017398 Source: CCN Type: SECTRACK ID: 1017405Mozilla Seamonkey Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1017405 Source: CCN Type: SECTRACK ID: 1017406Mozilla Thunderbird Memory Corruption in Layout Engine and Javascript Engine May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: Third Party Advisory, VDB Entry1017406 Source: CCN Type: Sun Alert ID: 102846Security Vulnerability in the Mozilla js_dtoa() Routine May Result in Denial of Service Source: SUNALERT Type: Broken Link102846 Source: CCN Type: ASA-2007-149Security Vulnerability in the Mozilla js_dtoa() Routine May Result in Denial of Service (Sun 102846) Source: DEBIAN Type: Third Party AdvisoryDSA-1253 Source: DEBIAN Type: Third Party AdvisoryDSA-1258 Source: DEBIAN Type: Third Party AdvisoryDSA-1265 Source: DEBIAN Type: DSA-1253mozilla-firefox -- several vulnerabilities Source: DEBIAN Type: DSA-1258mozilla-thunderbird -- several vulnerabilities Source: DEBIAN Type: DSA-1265mozilla -- several vulnerabilities Source: CCN Type: GLSA-200701-02Mozilla Firefox: Multiple vulnerabilities Source: CCN Type: GLSA-200701-04SeaMonkey: Multiple vulnerabilities Source: GENTOO Type: Third Party AdvisoryGLSA-200701-04 Source: CCN Type: US-CERT VU#427972Mozilla denial of service vulnerability Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#427972 Source: CCN Type: MFSA 2006-68Crashes with evidence of memory corruption (rv:1.8.0.9/1.8.1.1) Source: CONFIRM Type: Vendor Advisoryhttp://www.mozilla.org/security/announce/2006/mfsa2006-68.html Source: SUSE Type: Broken LinkSUSE-SA:2006:080 Source: SUSE Type: Broken LinkSUSE-SA:2007:006 Source: CCN Type: OSVDB ID: 31346Mozilla Multiple Products CPU FPP Reduction js_dtoa() Memory Corruption Source: BID Type: Third Party Advisory, VDB Entry21668 Source: CCN Type: BID-21668Mozilla Firefox/SeaMonkey/Thunderbird Multiple Remote Vulnerabilities Source: CCN Type: USN-398-1Firefox vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-398-1 Source: CCN Type: USN-398-2Firefox vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-398-2 Source: CCN Type: USN-398-3Firefox theme regression Source: CCN Type: USN-398-4Firefox regression Source: CCN Type: USN-400-1Thunderbird vulnerabilities Source: UBUNTU Type: Third Party AdvisoryUSN-400-1 Source: CERT Type: Third Party Advisory, US Government ResourceTA06-354A Source: VUPEN Type: Third Party AdvisoryADV-2006-5068 Source: VUPEN Type: Third Party AdvisoryADV-2007-1124 Source: VUPEN Type: Third Party AdvisoryADV-2008-0083 Source: XF Type: UNKNOWNmozilla-jsdtoa-dos(30994) Source: SUSE Type: SUSE-SA:2006:080Mozilla FirefoxThunderbird security problems Source: SUSE Type: SUSE-SA:2007:006mozilla security problems Vulnerable Configuration: Configuration 1 :cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version >= 1.5 and < 1.5.0.9)OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version >= 2.0 and < 2.0.0.1) OR cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version < 1.0.7) OR cpe:/a:mozilla:thunderbird:*:*:*:*:*:*:*:* (Version < 1.5.0.9) Configuration 2 :cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:* Configuration 3 :cpe:/o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* OR cpe:/o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:mozilla:thunderbird:0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::dev:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:-:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:* OR cpe:/a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:beta1:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:rc2:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:2.0:rc3:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:* OR cpe:/a:mozilla:firefox:1.5:beta2:*:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::alpha:*:*:*:*:* OR cpe:/a:mozilla:seamonkey:1.0::beta:*:*:*:*:* AND cpe:/o:sun:solaris:8::x86:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:9::x86:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:10::sparc:*:*:*:*:* OR cpe:/o:sun:solaris:10::x86:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
mozilla firefox *
mozilla firefox *
mozilla seamonkey *
mozilla thunderbird *
debian debian linux 3.1
debian debian linux 4.0
canonical ubuntu linux 5.10
canonical ubuntu linux 6.06
canonical ubuntu linux 6.10
mozilla thunderbird 0.8
mozilla thunderbird 1.0.1
mozilla firefox 1.5 beta1
mozilla firefox 2.0
mozilla thunderbird 1.0.2
mozilla thunderbird 1.0.6
mozilla thunderbird 1.0.7
mozilla seamonkey 1.0
mozilla firefox 1.5
mozilla thunderbird 1.5
mozilla thunderbird 1.5 beta2
mozilla firefox 1.5.0.2
mozilla firefox 1.5.0.3
mozilla firefox 1.5.0.4
mozilla firefox 1.5.0.6
mozilla firefox 1.5.0.7
mozilla thunderbird 1.5.0.7
mozilla seamonkey 1.0.5
mozilla seamonkey 1.0.2
mozilla thunderbird 1.5.0.6
mozilla thunderbird 1.5.0.8
mozilla thunderbird 1.5.0.4
mozilla thunderbird 1.5.0.3
mozilla thunderbird 1.5.0.2
mozilla thunderbird 1.5.0.1
mozilla firefox 2.0 beta1
mozilla firefox 2.0 rc2
mozilla firefox 2.0 rc3
mozilla seamonkey 1.0
mozilla seamonkey 1.0.1
mozilla seamonkey 1.0.3
mozilla seamonkey 1.0.4
mozilla seamonkey 1.0.6
mozilla firefox 1.5.0.1
mozilla firefox 1.5.0.5
mozilla firefox 1.5.0.8
mozilla firefox 1.5 beta2
mozilla seamonkey 1.0
mozilla seamonkey 1.0
sun solaris 8
gentoo linux *
suse linux enterprise server 8
sun solaris 8
sun solaris 9
novell linux desktop 9
debian debian linux 3.1
novell open enterprise server *
sun solaris 10
sun solaris 10
suse suse linux 10.0
canonical ubuntu 6.06
suse suse linux 10.1
novell open enterprise server *
novell opensuse 10.2
suse suse linux 9.3
sun solaris 9