First published: Thu Jul 27 2006(Updated: )
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0.1 | |
Mozilla Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Thunderbird | =1.5.0.2 | |
Mozilla Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla Firefox | =1.5.0.4 | |
Mozilla Firefox | =1.5.0.1 | |
Mozilla Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.