CVE-2006-1724
Summary
| CVE | CVE-2006-1724 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-04-14 10:02:00 UTC |
| Updated | 2018-10-18 16:34:00 UTC |
| Description | Unspecified vulnerability in Firefox and Thunderbird before 1.5.0.2, 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to DHTML. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Operating System | Debian | Debian Linux | 3.1 | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Mozilla | Firefox | All | All | All | All |
| Application | Mozilla | Mozilla Suite | All | All | All | All |
| Application | Mozilla | Mozilla Suite | All | All | All | All |
| Application | Mozilla | Seamonkey | All | All | All | All |
| Application | Mozilla | Seamonkey | All | All | All | All |
| Application | Mozilla | Thunderbird | All | All | All | All |
| Application | Mozilla | Thunderbird | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora Core 5 Update: firefox-1.5.0.2-1.1.fc5 | FEDORA | www.redhat.com | Third Party Advisory |
| SecurityTracker.com Archives - Mozilla Seamonkey Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code | SECTRACK | securitytracker.com | Third Party Advisory, VDB Entry |
| Mozilla SeaMonkey Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Debian -- Security Information -- DSA-1051-1 mozilla-thunderbird | DEBIAN | www.debian.org | Third Party Advisory |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | Third Party Advisory |
| SecurityFocus | HP | www.securityfocus.com | |
| Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| HP-UX update for firefox - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| [SECURITY] Fedora Core 4 Update: firefox-1.0.8-1.1.fc4 | FEDORA | www.redhat.com | Third Party Advisory |
| SecurityFocus | HP | www.securityfocus.com | |
| US-CERT Technical Cyber Security Alert TA06-107A -- Mozilla Products Contain Multiple Vulnerabilities | CERT | www.us-cert.gov | Third Party Advisory, US Government Resource |
| Debian -- Security Information -- DSA-1046-1 mozilla | DEBIAN | www.debian.org | Third Party Advisory |
| Mozilla Thunderbird Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code - SecurityTracker | SECTRACK | securitytracker.com | Third Party Advisory, VDB Entry |
| Secunia - Advisories - Red Hat update for firefox | SECUNIA | secunia.com | Third Party Advisory |
| 228526 | SUNALERT | sunsolve.sun.com | Broken Link |
| SecurityFocus | FEDORA | www.securityfocus.com | |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | Third Party Advisory |
| #102550: Multiple Security Vulnerabilites in Mozilla 1.4 and 1.7 for Solaris and for Sun JDS for Linux | SUNALERT | sunsolve.sun.com | Broken Link |
| Fedora update for firefox - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Permissions Required, Third Party Advisory |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | Third Party Advisory |
| Firefox Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Permissions Required, Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Permissions Required, Third Party Advisory |
| Debian update for mozilla - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| HP-UX update for thunderbird - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| SecurityTracker.com Archives - Mozilla Firefox Memory Corruption in Processing DHTML May Let Remote Users Execute Arbitrary Code | SECTRACK | securitytracker.com | Third Party Advisory, VDB Entry |
| Debian update for mozilla-thunderbird - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| SecurityFocus | HP | www.securityfocus.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | Third Party Advisory |
| UnixWare update for mozilla - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| MFSA 2006-20: Crashes with evidence of memory corruption (rv:1.8.0.2) | CONFIRM | www.mozilla.org | Vendor Advisory |
| Red Hat update for thunderbird - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| SCOSA-2006.26 | SCO | ftp.sco.com | Third Party Advisory |
| Sun Solaris update for mozilla - Advisories - Secunia | SECUNIA | secunia.com | Third Party Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Permissions Required, Third Party Advisory |
| ASA-2006-205 (SUN 102502, 102513, 102514, 102519, 102550, 102556, 102557, 102582, 102588, 102589, 102593) | CONFIRM | support.avaya.com | Third Party Advisory |
| 282105 – [FIX]BoxObject's InvalidatePresentationStuff needs ability to tell document to remove it from its boxobject table | MISC | bugzilla.mozilla.org | Issue Tracking, Vendor Advisory |
| US-CERT Vulnerability Note VU#350262 | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.