First published: Thu Jul 27 2006(Updated: )
Multiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | =1.0.1 | |
Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5 | |
Mozilla SeaMonkey | =1.0.2 | |
Thunderbird | =1.5 | |
Thunderbird | =1.5.0.2 | |
Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Firefox | =1.5.0.4 | |
Firefox | =1.5.0.1 | |
Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3806 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2006-3806, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey to the latest version that addresses this vulnerability.
CVE-2006-3806 affects Mozilla Firefox versions prior to 1.5.0.5, Mozilla Thunderbird versions prior to 1.5.0.5, and SeaMonkey versions prior to 1.0.3.
Yes, CVE-2006-3806 can be exploited remotely by attackers to execute arbitrary code on a vulnerable system.
There are no effective workarounds for CVE-2006-3806; the recommended action is to update to a secure version.