First published: Tue Feb 28 2006(Updated: )
Bugzilla 2.16.10, 2.17 through 2.18.4, and 2.20 does not properly handle certain characters in the mostfreqthreshold parameter in duplicates.cgi, which allows remote attackers to trigger a SQL error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Bugzilla | =2.17.6 | |
Mozilla Bugzilla | =2.20-rc2 | |
Mozilla Bugzilla | =2.20-rc1 | |
Mozilla Bugzilla | =2.18-rc1 | |
Mozilla Bugzilla | =2.17.4 | |
Mozilla Bugzilla | =2.18.1 | |
Mozilla Bugzilla | =2.17.5 | |
Mozilla Bugzilla | =2.18.4 | |
Mozilla Bugzilla | =2.18 | |
Mozilla Bugzilla | =2.18.3 | |
Mozilla Bugzilla | =2.17.7 | |
Mozilla Bugzilla | =2.17 | |
Mozilla Bugzilla | =2.18.2 | |
Mozilla Bugzilla | =2.18-rc2 | |
Mozilla Bugzilla | =2.16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0914 has been classified as a moderate vulnerability due to the potential for a SQL error when specific characters are handled incorrectly.
To mitigate CVE-2006-0914, you should upgrade to a Bugzilla version that is not affected, such as any version later than 2.18.4.
CVE-2006-0914 affects Bugzilla versions 2.16.10, 2.17 through 2.18.4, and 2.20.
CVE-2006-0914 allows remote attackers to trigger a SQL error by exploiting improper handling of characters.
Detailed information about CVE-2006-0914, including its implications and fixes, can be found in Bugzilla's issue tracking system.