First published: Thu Jul 27 2006(Updated: )
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0.1 | |
Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0.2 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3803 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2006-3803, upgrade your Mozilla Firefox, Thunderbird, or SeaMonkey to versions 1.5.0.5 or later.
CVE-2006-3803 affects Mozilla Firefox versions prior to 1.5.0.5, Thunderbird versions prior to 1.5.0.5, and SeaMonkey versions prior to 1.0.3.
Yes, CVE-2006-3803 can be exploited remotely by attackers to execute arbitrary code.
Systems running vulnerable versions of Mozilla Firefox, Thunderbird, and SeaMonkey are at risk from CVE-2006-3803.