First published: Thu Jul 27 2006(Updated: )
The Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0.1 | |
Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0.2 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3805 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2006-3805, update Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions that address this vulnerability.
CVE-2006-3805 affects Mozilla Firefox versions before 1.5.0.5, Thunderbird versions before 1.5.0.5, and SeaMonkey versions before 1.0.3.
CVE-2006-3805 is not a risk for users with updated versions of Mozilla Firefox, Thunderbird, or SeaMonkey.
The potential impacts of CVE-2006-3805 include unauthorized access and the execution of arbitrary code on the affected systems.