First published: Fri Sep 15 2006(Updated: )
Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | <=1.0.4 | |
Thunderbird | <=1.5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4570 is classified as a high severity vulnerability.
To mitigate CVE-2006-4570, upgrade to Mozilla Thunderbird version 1.5.0.7 or later and SeaMonkey version 1.0.5 or later.
CVE-2006-4570 exploits the ability to load remote XBL files in affected email clients, bypassing JavaScript protections.
CVE-2006-4570 specifically affects users with 'Load Images' enabled in certain earlier versions of Mozilla Thunderbird and SeaMonkey.
Yes, CVE-2006-4570 can potentially compromise user privacy by allowing remote attackers to execute unwanted scripts.