First published: Fri Sep 15 2006(Updated: )
Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=1.5.0.6 | |
Thunderbird | <=1.5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4567 is considered a moderate severity vulnerability due to its ability to facilitate user-assisted attacks.
To fix CVE-2006-4567, upgrade Mozilla Firefox and Thunderbird to version 1.5.0.7 or later.
CVE-2006-4567 affects Mozilla Firefox versions before 1.5.0.7 and Mozilla Thunderbird versions before 1.5.0.7.
CVE-2006-4567 allows remote user-assisted attackers to use DNS spoofing to trick users into accepting malicious self-signed certificates.
While CVE-2006-4567 was identified in 2006, it highlights important security practices that are still relevant for ensuring safe browsing.