First published: Thu Feb 02 2006(Updated: )
Multiple integer overflows in Mozilla Firefox 1.5, Thunderbird 1.5 if Javascript is enabled in mail, and SeaMonkey before 1.0 might allow remote attackers to execute arbitrary code via the (1) EscapeAttributeValue in jsxml.c for E4X, (2) nsSVGCairoSurface::Init in SVG, and (3) nsCanvasRenderingContext2D.cpp in Canvas.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0-beta | |
Firefox | =1.5-beta1 | |
Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0 | |
Thunderbird | =1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0297 is classified as a critical severity vulnerability due to the potential for arbitrary code execution.
To mitigate CVE-2006-0297, users should update to the latest versions of Mozilla Firefox, Thunderbird, or SeaMonkey.
CVE-2006-0297 affects Mozilla Firefox 1.5, Thunderbird 1.5, and SeaMonkey 1.0, including their beta and alpha versions.
Yes, CVE-2006-0297 can be exploited remotely by attackers if JavaScript is enabled in the affected software.
CVE-2006-0297 contains multiple integer overflow vulnerabilities related to E4X and SVG processing.