CVE-2006-1993
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
25/04/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Mozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.
Impacto
Puntuación base 2.0
5.10
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/19802
- http://secunia.com/advisories/20015
- http://secunia.com/advisories/20019
- http://secunia.com/advisories/20070
- http://secunia.com/advisories/20214
- http://secunia.com/advisories/22066
- http://securityreason.com/securityalert/780
- http://securitytracker.com/id?1015981=
- http://www.debian.org/security/2006/dsa-1053
- http://www.debian.org/security/2006/dsa-1055
- http://www.gentoo.org/security/en/glsa/glsa-200605-06.xml
- http://www.kb.cert.org/vuls/id/866300
- http://www.mozilla.org/security/announce/2006/mfsa2006-30.html
- http://www.securident.com/vuln/ff.txt
- http://www.securityfocus.com/archive/1/431878/100/0/threaded
- http://www.securityfocus.com/archive/1/434524/100/0/threaded
- http://www.securityfocus.com/archive/1/434524/100/0/threaded
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
- http://www.securityfocus.com/bid/17671
- http://www.vupen.com/english/advisories/2006/1614
- http://www.vupen.com/english/advisories/2006/1922
- http://www.vupen.com/english/advisories/2006/3748
- http://www.vupen.com/english/advisories/2008/0083
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25994
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1790
- http://secunia.com/advisories/19802
- http://secunia.com/advisories/20015
- http://secunia.com/advisories/20019
- http://secunia.com/advisories/20070
- http://secunia.com/advisories/20214
- http://secunia.com/advisories/22066
- http://securityreason.com/securityalert/780
- http://securitytracker.com/id?1015981=
- http://www.debian.org/security/2006/dsa-1053
- http://www.debian.org/security/2006/dsa-1055
- http://www.gentoo.org/security/en/glsa/glsa-200605-06.xml
- http://www.kb.cert.org/vuls/id/866300
- http://www.mozilla.org/security/announce/2006/mfsa2006-30.html
- http://www.securident.com/vuln/ff.txt
- http://www.securityfocus.com/archive/1/431878/100/0/threaded
- http://www.securityfocus.com/archive/1/434524/100/0/threaded
- http://www.securityfocus.com/archive/1/434524/100/0/threaded
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
- http://www.securityfocus.com/bid/17671
- http://www.vupen.com/english/advisories/2006/1614
- http://www.vupen.com/english/advisories/2006/1922
- http://www.vupen.com/english/advisories/2006/3748
- http://www.vupen.com/english/advisories/2008/0083
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25994
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1790