First published: Wed Dec 20 2006(Updated: )
The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | >=1.5<1.5.0.9 | |
Firefox | >=2.0<2.0.0.1 | |
Mozilla SeaMonkey | <1.0.7 | |
Thunderbird | <1.5.0.9 | |
Debian Linux | =3.1 | |
Debian Linux | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =5.10 | |
>=1.5<1.5.0.9 | ||
>=2.0<2.0.0.1 | ||
<1.0.7 | ||
<1.5.0.9 | ||
=3.1 | ||
=4.0 | ||
=5.10 | ||
=6.06 | ||
=6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6499 has been classified as having a moderate severity due to its potential to cause denial of service.
To fix CVE-2006-6499, update affected versions of Mozilla Firefox, Thunderbird, or SeaMonkey to their respective patched versions.
Versions of Mozilla Firefox before 2.0.0.1, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 are vulnerable to CVE-2006-6499.
Yes, CVE-2006-6499 can be exploited by remote attackers through malicious plugins.
CVE-2006-6499 facilitates a denial of service attack by allowing memory overwrites.