First published: Thu Jul 27 2006(Updated: )
Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allows remote attackers to hijack native DOM methods from objects in another domain and conduct cross-site scripting (XSS) attacks using DOM methods of the top-level object.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0.1 | |
Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0.2 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3802 is considered a medium severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2006-3802, update to Firefox version 1.5.0.5, Thunderbird version 1.5.0.5, or SeaMonkey version 1.0.3 or later.
CVE-2006-3802 affects Mozilla Firefox, Mozilla Thunderbird, and Mozilla SeaMonkey prior to specified versions.
Yes, CVE-2006-3802 can be exploited remotely which makes the vulnerability more serious.
Implementing input validation and content security policies can help mitigate the risks associated with CVE-2006-3802.