firefox,seamonkey,thunderbird 内存破坏代码执行漏洞

admin 2023-12-13 18:37:35 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 firefox,seamonkey,thunderbird 内存破坏代码执行漏洞

CVE编号

CVE-2006-6504

利用情况

暂无

补丁情况

官方补丁

披露时间

2006-12-20
漏洞描述
Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
http://fedoranews.org/cms/node/2297
http://fedoranews.org/cms/node/2338
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
http://rhn.redhat.com/errata/RHSA-2006-0758.html
http://rhn.redhat.com/errata/RHSA-2006-0759.html
http://rhn.redhat.com/errata/RHSA-2006-0760.html
http://secunia.com/advisories/23282
http://secunia.com/advisories/23422
http://secunia.com/advisories/23433
http://secunia.com/advisories/23439
http://secunia.com/advisories/23440
http://secunia.com/advisories/23468
http://secunia.com/advisories/23514
http://secunia.com/advisories/23545
http://secunia.com/advisories/23589
http://secunia.com/advisories/23601
http://secunia.com/advisories/23614
http://secunia.com/advisories/23618
http://secunia.com/advisories/23672
http://secunia.com/advisories/23692
http://security.gentoo.org/glsa/glsa-200701-02.xml
http://securitytracker.com/id?1017417
http://securitytracker.com/id?1017418
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml
http://www.kb.cert.org/vuls/id/928956
http://www.mandriva.com/security/advisories?name=MDKSA-2007:010
http://www.mozilla.org/security/announce/2006/mfsa2006-73.html
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
http://www.securityfocus.com/archive/1/454939/100/0/threaded
http://www.securityfocus.com/archive/1/455145/100/0/threaded
http://www.securityfocus.com/archive/1/455728/100/200/threaded
http://www.securityfocus.com/bid/21668
http://www.ubuntu.com/usn/usn-398-1
http://www.ubuntu.com/usn/usn-398-2
http://www.us-cert.gov/cas/techalerts/TA06-354A.html
http://www.vupen.com/english/advisories/2006/5068
http://www.vupen.com/english/advisories/2008/0083
http://www.zerodayinitiative.com/advisories/ZDI-06-051.html
https://issues.rpath.com/browse/RPL-883
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 mozilla firefox * From (including) 1.5 Up to (excluding) 1.5.0.9
运行在以下环境
应用 mozilla firefox * From (including) 2.0 Up to (excluding) 2.0.0.1
运行在以下环境
应用 mozilla seamonkey * Up to (excluding) 1.0.7
运行在以下环境
系统 debian_10 firefox-esr * Up to (excluding) 45.0esr-1
运行在以下环境
系统 debian_11 firefox-esr * Up to (excluding) 45.0esr-1
运行在以下环境
系统 debian_12 firefox-esr * Up to (excluding) 45.0esr-1
运行在以下环境
系统 debian_sid firefox * Up to (excluding) 45.0-1
阿里云评分 6.2
  • 攻击路径 远程
  • 攻击复杂度 容易
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-94 对生成代码的控制不恰当(代码注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0