Vulnerability CVE-2006-5159


Published: 2006-10-05   Modified: 2012-02-12

Description:
** DISPUTED ** Stack-based buffer overflow in Mozilla Firefox allows remote attackers to execute arbitrary code via unspecified vectors involving JavaScript. NOTE: the vendor and original researchers have released a follow-up comment disputing the severity of this issue, in which the researcher states that "we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this... I have not succeeded in making this code do anything more than cause a crash and eat up system resources".

See advisories in our WLB2 database:
Topic
Author
Date
Low
0day in Firefox from ToorCon \'06
Thor Larholm (th...
05.10.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Mozilla -> Firefox 

 References:
http://developer.mozilla.org/devnews/index.php/2006/10/02/update-possible-vulnerability-reported-at-toorcon/
http://securityreason.com/securityalert/1678
http://securitytracker.com/id?1016962
http://www.securityfocus.com/archive/1/447493/100/0/threaded
http://www.securityfocus.com/archive/1/447497/100/0/threaded
http://www.securityfocus.com/bid/20282
http://www.securityfocus.com/bid/20294
http://www.securitypronews.com/insiderreports/insider/spn-49-20061003FirefoxVulnerabilityClaimWasAJoke.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/29317

Copyright 2020, cxsecurity.com

 

Back to Top