First published: Fri Apr 14 2006(Updated: )
Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via "an invalid and non-sensical ordering of table-related tags" that results in a negative array index.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | =1.5-beta2 | |
Mozilla Thunderbird | =1.0.7 | |
Mozilla Firefox | =1.0.2 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5 | |
Mozilla Firefox | =1.0.4 | |
Mozilla Firefox | =1.0.7 | |
Mozilla Thunderbird | =1.0 | |
Mozilla Thunderbird | =1.0.1 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Thunderbird | =1.0.2 | |
Mozilla Firefox | =1.0 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Firefox | =1.0.1 | |
Mozilla Firefox | =preview_release | |
Mozilla Thunderbird | =1.0.4 | |
Mozilla Thunderbird | =1.0.3 | |
Mozilla Firefox | =1.0.3 | |
Mozilla Thunderbird | =1.0.6 | |
Mozilla Thunderbird | =1.0.5-beta | |
Mozilla Thunderbird | =1.5.0.1 | |
Mozilla Thunderbird | =1.0.5 | |
Mozilla Firefox | =1.5.0.1 | |
Mozilla Firefox | =1.0.5 | |
Mozilla Firefox | =1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0748 is classified as a critical vulnerability, as it allows remote attackers to execute arbitrary code.
To fix CVE-2006-0748, users should upgrade to the latest version of Mozilla Firefox or Thunderbird that has patched the vulnerability.
CVE-2006-0748 affects Mozilla Firefox and Thunderbird versions prior to 1.5.0.2 and 1.0.8, along with Mozilla Suite and SeaMonkey before version 1.0.1.
CVE-2006-0748 can be exploited through specially crafted web pages or email messages that trigger the vulnerability.
While there is no official workaround for CVE-2006-0748, users are advised to avoid opening untrusted links and emails until they can update their software.