ID

VAR-200607-0664


CVE

CVE-2006-3677


TITLE

Mozilla Firefox Javascript Navigator Object Remote Code Execution Vulnerability

Trust: 0.9

sources: BID: 19192 // CNNVD: CNNVD-200607-482

DESCRIPTION

Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution. Mozilla products fail to properly release memory. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The flaw exists when assigning specific values to the window.navigator object. A lack of checking on assignment causes user supplied data to be later used in the creation of other objects leading to eventual code execution. The Mozilla Foundation has released thirteen security advisories specifying vulnerabilities in Mozilla Firefox, SeaMonkey, and Thunderbird. Other attacks may also be possible. The issues described here will be split into individual BIDs as more information becomes available. These issues are fixed in: - Mozilla Firefox 1.5.0.5 - Mozilla Thunderbird 1.5.0.5 - Mozilla SeaMonkey 1.0.3. Mozilla Firefox is prone to a remote code-execution vulnerability because the application fails to properly sanitize user-supplied input before using it to create new JavaScript objects. This issue was previously discussed in BID 19181 (Mozilla Multiple Products Remote Vulnerabilities). =========================================================== Ubuntu Security Notice USN-327-1 July 27, 2006 firefox vulnerabilities CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: firefox 1.5.dfsg+1.5.0.5-0ubuntu6.06 After a standard system upgrade you need to restart Firefox to effect the necessary changes. Please note that Firefox 1.0.8 in Ubuntu 5.10 and Ubuntu 5.04 are also affected by these problems. Updates for these Ubuntu releases will be delayed due to upstream dropping support for this Firefox version. We strongly advise that you disable JavaScript to disable the attack vectors for most vulnerabilities if you use one of these Ubuntu versions. (CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3809, CVE-2006-3811, CVE-2006-3812) cross-site scripting vulnerabilities were found in the XPCNativeWrapper() function and native DOM method handlers. A malicious web site could exploit these to modify the contents or steal confidential data (such as passwords) from other opened web pages. (CVE-2006-3802, CVE-2006-3810) A bug was found in the script handler for automatic proxy configuration. (CVE-2006-3808) Please see http://www.mozilla.org/projects/security/known-vulnerabilities.html#Firefox for technical details of these vulnerabilities. Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz Size/MD5: 174602 7be6f5862219ac4cf44f05733f372f2b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc Size/MD5: 1109 252d6acf45b009008a6bc88166e2632f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz Size/MD5: 44067762 749933c002e158576ec15782fc451e43 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb Size/MD5: 49190 850dd650e7f876dd539e605d9b3026c8 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb Size/MD5: 50078 c1fa4a40187d9c5b58bd049edb00ce54 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 47269292 167aadc3f03b4e1b7cb9ed826e672983 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 2796768 b54592d0bd736f6ee12a90987771bc59 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 216136 79fa6c69ffb0dd6037e56d1ba538ff64 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 82358 e2e026d582a7b5352cee4453cef0fe45 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 9400544 a9d0b804a4374dc636bb79968a2bce5c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 218822 a09476caea7d8d73d6a2f534bd494493 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 161876 0e0e65348dba8167b4891b173baa8f0d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 235746 064fc1434a315f857ee92f60fd49d772 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb Size/MD5: 757458 bd6a5e28e05a04a5deca731ab29f70e4 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 43837610 a7e4a535262f8a5d5cb0ace7ed785237 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 2796700 4509dbf62e3fd2cda7168c20aa65ba4f http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 209546 50e174c1c7290fca51f9e1ee71ebb56c http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 74732 25ba86caeeb1a88da4493875178a3636 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 7916536 40ebfe4330af25c2359f8b25b039ed5e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 218822 6066f59acbce1b4de2dc284b5801efc5 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 146570 c1a5c5cc4371b228093d03d9ed7ad607 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 235754 0e9a1a89f63a9869b875ee6a50547c2b http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb Size/MD5: 669556 d537a4771b80e5c06f18b2c5d7e5d384 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 48648192 479d29e08ff2b9cef89a6da3285c0aad http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 2796790 60b97738bfc3b8b32914487bb4aba239 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 212982 a396e119a32303afc024d513b997c84e http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 77894 ef7841bb2ab8de0e0c44e59c893b1622 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 9019132 ed3927484eea5fccf84a2840640febf3 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 218826 a2338c3c8064a304deb752bf32a291f8 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 159112 7d5d6100727ceb894695b219cec11e43 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 235754 69085beb145222fea07d2d6c19158a2d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb Size/MD5: 768332 8dc6cc8c54185d57af14bab3bee39f9d sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 45235424 f5a07188af5802fffbd3cfdd64b109cf http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 2796756 cb13c7ea0e3b7af2f1e12db1f8dc38a2 http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 210488 17f7723b697110c8f132422bc059d447 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 76340 c38ccb8b71b9c3783a1c9816ecd9cf5d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 8411310 4b3865b2df3924d094e0b18f207bf33d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 218814 a0e67d0d425cea2cd5835e2c2faa930f http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 149018 73108368f0ef745188ebd1c48ea10c88 http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 235746 695a6122710fb30201daaa239ba6d48d http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb Size/MD5: 681612 896721beb3cdcea12bab98223c0796c2 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-208A Mozilla Products Contain Multiple Vulnerabilities Original release date: July 27, 2006 Last revised: -- Source: US-CERT Systems Affected * Mozilla SeaMonkey * Mozilla Firefox * Mozilla Thunderbird Any products based on Mozilla components, specifically Gecko, may also be affected. I. (CVE-2006-3805) VU#655892 - Mozilla JavaScript engine contains multiple integer overflows The Mozilla JavaScript engine contains multiple integer overflows. (CVE-2006-3811) II. III. Disable JavaScript and Java These vulnerabilities can be mitigated by disabling JavaScript and Java in all affected products. Instructions for disabling Java in Firefox can be found in the "Securing Your Web Browser" document. Appendix A. Please send email to <cert@cert.org> with "TA06-208A Feedback VU#239124" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History Jul 27, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRMkgNexOF3G+ig+rAQIFsAgAoWoMkxxhkzb+xgLVCJF7h4k4EBCgJGWa BSOiFfL4Gs4vv4lNooDRCIOdxiBfXYL71XsIOT4aWry5852/6kyYnyAiXXYj1Uv0 SbPY2sQSZ5EaG+G9i8HDIy3fpJN4XgH3ng1uzUnJihY19IfndbXicpZE+debIUri qt9NRD2f5FW5feKo1cBpYxtmxQAEePOa2dJHh7I7cnFGtG3MixHx4kVEyuYUutCX 5tHDsfTIdySNkIdCQ4vhk846bErB/kaHiKMQDfMglllb3GOSc07OQ0CDo2eTPVsA 9DtKkiDP1C4dh1mxco8CWlS6327+EB0KXGGoqDF2+j/rrpsW0oc8nA== =HwuK -----END PGP SIGNATURE----- . Background ========== The Mozilla SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as "Mozilla Application Suite". The goal is to produce a cross-platform stand-alone browser application. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/mozilla-firefox < 1.5.0.5 >= 1.5.0.5 2 www-client/mozilla-firefox-bin < 1.5.0.5 >= 1.5.0.5 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. * Developers in the Mozilla community looked for and fixed several crash bugs to improve the stability of Mozilla clients. * "shutdown" reports that cross-site scripting (XSS) attacks could be performed using the construct XPCNativeWrapper(window).Function(...), which created a function that appeared to belong to the window in question even after it had been navigated to the target site. * "shutdown" reports that scripts granting the UniversalBrowserRead privilege can leverage that into the equivalent of the far more powerful UniversalXPConnect since they are allowed to "read" into a privileged context. * "moz_bug_r_a4" reports that A malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. * "moz_bug_r_a4" discovered that Named JavaScript functions have a parent object created using the standard Object() constructor (ECMA-specified behavior) and that this constructor can be redefined by script (also ECMA-specified behavior). * Igor Bukanov and shutdown found additional places where an untimely garbage collection could delete a temporary object that was in active use. * Georgi Guninski found potential integer overflow issues with long strings in the toSource() methods of the Object, Array and String objects as well as string function arguments. * H. D. Moore reported a testcase that was able to trigger a race condition where JavaScript garbage collection deleted a temporary variable still being used in the creation of a new Function object. * A malicious page can hijack native DOM methods on a document object in another domain, which will run the attacker's script when called by the victim page. This leads to use of a deleted timer object. * An anonymous researcher for TippingPoint and the Zero Day Initiative showed that when used in a web page Java would reference properties of the window.navigator object as it started up. * Thilo Girmann discovered that in certain circumstances a JavaScript reference to a frame or window was not properly cleared when the referenced content went away. Impact ====== A user can be enticed to open specially crafted URLs, visit webpages containing malicious JavaScript or execute a specially crafted script. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.5" Users of the binary package should upgrade as well: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.5" References ========== [ 1 ] CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 [ 2 ] CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 [ 3 ] CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 [ 4 ] CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 [ 5 ] CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 [ 6 ] CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 [ 7 ] CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 [ 8 ] CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 [ 9 ] CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 [ 10 ] CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 [ 11 ] CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 [ 12 ] CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 [ 13 ] CVE-2006-3812 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200608-03.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. For more information, see vulnerabilities #1, #3, #4, #5, #6, #7, #9, #10, and #11: SA19783 Successful exploitation of these vulnerabilities requires that JavaScript is enabled in mails (not default setting). A boundary error has also been reported in the handling of VCard attachments. This can be exploited to cause a heap-based buffer overflow via a malicious VCard with a specially crafted base64 field that causes a crash and may allow execution of arbitrary code. SOLUTION: Update to version 1.5.0.5. PROVIDED AND/OR DISCOVERED BY: Daniel Veditz, Mozilla. ORIGINAL ADVISORY: http://www.mozilla.org/security/announce/2006/mfsa2006-49.html OTHER REFERENCES: SA19783: http://secunia.com/advisories/19873/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Previous updates to Firefox were patch fixes to Firefox 1.0.6 that brought it in sync with 1.0.8 in terms of security fixes. In this update, Mozilla Firefox 1.5.0.6 is being provided which corrects a number of vulnerabilities that were previously unpatched, as well as providing new and enhanced features. The following CVE names have been corrected with this update: CVE-2006-2613, CVE-2006-2894, CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787, CVE-2006-2788, CVE-2006-3677, CVE-2006-3803, CVE-2006-3804, CVE-2006-3806, CVE-2006-3807, CVE-2006-3113, CVE-2006-3801, CVE-2006-3802, CVE-2006-3805, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810, CVE-2006-3811, CVE-2006-3812. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2613 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812 http://www.mozilla.org/security/announce/2006/mfsa2006-31.html http://www.mozilla.org/security/announce/2006/mfsa2006-32.html http://www.mozilla.org/security/announce/2006/mfsa2006-33.html http://www.mozilla.org/security/announce/2006/mfsa2006-34.html http://www.mozilla.org/security/announce/2006/mfsa2006-35.html http://www.mozilla.org/security/announce/2006/mfsa2006-36.html http://www.mozilla.org/security/announce/2006/mfsa2006-37.html http://www.mozilla.org/security/announce/2006/mfsa2006-38.html http://www.mozilla.org/security/announce/2006/mfsa2006-39.html http://www.mozilla.org/security/announce/2006/mfsa2006-41.html http://www.mozilla.org/security/announce/2006/mfsa2006-42.html http://www.mozilla.org/security/announce/2006/mfsa2006-43.html http://www.mozilla.org/security/announce/2006/mfsa2006-44.html http://www.mozilla.org/security/announce/2006/mfsa2006-45.html http://www.mozilla.org/security/announce/2006/mfsa2006-46.html http://www.mozilla.org/security/announce/2006/mfsa2006-47.html http://www.mozilla.org/security/announce/2006/mfsa2006-48.html http://www.mozilla.org/security/announce/2006/mfsa2006-50.html http://www.mozilla.org/security/announce/2006/mfsa2006-51.html http://www.mozilla.org/security/announce/2006/mfsa2006-52.html http://www.mozilla.org/security/announce/2006/mfsa2006-53.html http://www.mozilla.org/security/announce/2006/mfsa2006-54.html http://www.mozilla.org/security/announce/2006/mfsa2006-55.html http://www.mozilla.org/security/announce/2006/mfsa2006-56.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 76ef1a2e7338c08e485ab2c19a1ce691 2006.0/RPMS/devhelp-0.10-7.1.20060mdk.i586.rpm d44f02b82df9f404f899ad8bc4bdd6a2 2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.i586.rpm 29efc065aeb4a53a105b2c27be816758 2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.i586.rpm caad34c0d4c16a50ec4b05820e6d01db 2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.i586.rpm d0e75938f4e129936351f015bd90a37a 2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm 652044ff7d9c3170df845011ec696393 2006.0/RPMS/libdevhelp-1_0-0.10-7.1.20060mdk.i586.rpm bf6dcf87f409d06b42234dbca387b922 2006.0/RPMS/libdevhelp-1_0-devel-0.10-7.1.20060mdk.i586.rpm e9aaff3090a4459b57367f4903b0458a 2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm fa99cbc159722cc0ff9e5710f24ca599 2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm d4d45b797ca2f2347c0409d9f956ff25 2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm 8d33e72703090a911f7fd171ad9dd719 2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm 23afd287c042c5492c210255554a6893 2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm 4a188f54230b943ea9c8930eb2e0cfe1 2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.i586.rpm 5bec4690547fd733ca97cb2933ebe427 2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.i586.rpm 55836595e5cba3828a9a5a27e5aa1825 2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.i586.rpm 0faf5ee7022ee0b70915d2c845865cae 2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.i586.rpm 312a89317692b3bd86060a1995365d86 2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.i586.rpm 38215dccbee8a169bcbac2af2897c2f7 2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.i586.rpm aaba2fa72f8de960a3a757b3010027d3 2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.i586.rpm d8d59a55974f6fa20d99fb30f126638f 2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.i586.rpm 946e6a76c71dbbee3340f1a96ae25a1d 2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.i586.rpm 9a14c31a41c2bac3942caa3d1fb5daee 2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.i586.rpm b5074c27d1cb719bf9f8fabe8aebf628 2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.i586.rpm 7a225cdfdf0c17c0f4a72ad27907fc07 2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.i586.rpm 06526a054d108d3c9b5f66313151ecc2 2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.i586.rpm 8f721bd3914c31e04359def6272db929 2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.i586.rpm a704ed726e6db4ba59592563cd2c48b0 2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.i586.rpm 0ef6729b05e013a364e847e4a1b7b3e3 2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.i586.rpm 570b19872de676414b399ff970024b78 2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.i586.rpm dee38f0bbe3870d3bd8ad02ea968c57a 2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.i586.rpm 92916e155ec38b5078234728593d72a2 2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.i586.rpm c808f2f32fc9e514ffb097eeeb226a96 2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.i586.rpm 6dda5771d062eae75f8f04b7dab8d6cc 2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.i586.rpm c4ac8441170504cc5ec05cf5c8e6e9f9 2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.i586.rpm 2765008afd4c0ba1d702eda9627a7690 2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.i586.rpm 15b600977b07651f1c3568f4d7f1f9ac 2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.i586.rpm 6f1fae6befe608fc841fcc71e15852c0 2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.i586.rpm 81f412da40ea14bcc23d420d7a5724f9 2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.i586.rpm 76e0ece3c0b6f507340871a168a57e36 2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.i586.rpm 6ded58e85ed113718cfb3484ae420bb9 2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.i586.rpm c76f6648e88de4a63991eac66c3fba04 2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.i586.rpm 1c7ab93275bcdcf30ed9ec2ddb4893df 2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.i586.rpm 60279919aa5f17c2ecd9f64db87cb952 2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm c446c046409b6697a863868fe5c64222 2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm e726300336f737c8952f664bf1866d6f 2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm e9e30596eceb0bc9a03f7880cd7d14ea 2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm 4168c73cba97276fa4868b4ac2c7eb19 2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm 6a7df29f5af703d10d7ea1fee160ac00 2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm e56e14c28051ec4332cbde8dbee7bb6a 2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm 1a144c86fd8db39e2801117296e15d2b 2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm f4889d2ee6e07c0141b57ab9aaccae64 2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm dee0f7bc91c797e880fff19e1cb05a63 2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm 45724f6ceed66701392bd131feaf1f6d 2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm cc680cac7fea3f7f8a48a5daf86db088 2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm 69b04335c21313262af4253863109cc8 2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm 2aab89244a535afcbc25271df5d6b33f 2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm f1c7f71d5484c5047b1b38fc16888ae3 2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm 3963e3c3a2c38c41d9d3bc5250b124a6 2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm bb54aed17a126a9e8568d49866db99ea 2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm 2a1b11f2c8944bc1fc0d313d54a903cf 2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm 783c5b3c0fb9916e07f220110155476d 2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm 895e315731fa0b453045cc39da4f5358 2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm daa0a127d2a1a3641d4e97bfb95f1647 2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm 0c778b0738b11dfd5d68be48fa6316ed 2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm 7025d0118cf29e39117bd87c586e84a3 2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm 5d8b8e869f588c0f5751e9ce7addba45 2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm c5148674a8c7dd1f88c5729293f899ba 2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm 91d490c075473e2443e383201b961cb8 2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm 622ae4619d151bb1634113e50b30fbac 2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm e6d64c14929d299e2fb52e334ae6641a 2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm 20f64c6dfd6aa1450cba5002d42f53d8 2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm b93a6b548bb1cf0f8cc46dec133e81a3 2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm f5603b65b3d10fa5083934e08d2d4560 2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm c0e978ea92b4a8f3aa75dad5ab7588b9 2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm 93cb0acaeddb095d13b37aeb0ab4dd49 2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: d52f4955f15f99137dd9a0b2f360c8b2 x86_64/2006.0/RPMS/devhelp-0.10-7.1.20060mdk.x86_64.rpm 369457b4a09c07ba18ee5bb18fb2ffa1 x86_64/2006.0/RPMS/epiphany-1.8.5-4.1.20060mdk.x86_64.rpm 76735684f3ff493770e374a90fd359c7 x86_64/2006.0/RPMS/epiphany-devel-1.8.5-4.1.20060mdk.x86_64.rpm 5da75ab6624f8c8f0c212ce2299d645f x86_64/2006.0/RPMS/galeon-2.0.1-1.1.20060mdk.x86_64.rpm 945059b9456c9ff2ccd40ff4a6d8ae70 x86_64/2006.0/RPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.noarch.rpm 193f97760bb46e16051ba7b6b968f340 x86_64/2006.0/RPMS/lib64devhelp-1_0-0.10-7.1.20060mdk.x86_64.rpm 1b67733b0450cd6572c9879c0eb38640 x86_64/2006.0/RPMS/lib64devhelp-1_0-devel-0.10-7.1.20060mdk.x86_64.rpm 115fcbc6c99bf063cd1768d2b08e9d89 x86_64/2006.0/RPMS/lib64nspr4-1.5.0.6-1.4.20060mdk.x86_64.rpm 686404fa32e2625f23b19e11c548bbe5 x86_64/2006.0/RPMS/lib64nspr4-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm f0886b330d3f5af566af6cf5572ca671 x86_64/2006.0/RPMS/lib64nspr4-static-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm 10e9abdcb3f952c4db35c85fe58ad8ad x86_64/2006.0/RPMS/lib64nss3-1.5.0.6-1.4.20060mdk.x86_64.rpm 202bab2742f162d1cbd6d36720e6f7fb x86_64/2006.0/RPMS/lib64nss3-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm e9aaff3090a4459b57367f4903b0458a x86_64/2006.0/RPMS/libnspr4-1.5.0.6-1.4.20060mdk.i586.rpm fa99cbc159722cc0ff9e5710f24ca599 x86_64/2006.0/RPMS/libnspr4-devel-1.5.0.6-1.4.20060mdk.i586.rpm d4d45b797ca2f2347c0409d9f956ff25 x86_64/2006.0/RPMS/libnspr4-static-devel-1.5.0.6-1.4.20060mdk.i586.rpm 8d33e72703090a911f7fd171ad9dd719 x86_64/2006.0/RPMS/libnss3-1.5.0.6-1.4.20060mdk.i586.rpm 23afd287c042c5492c210255554a6893 x86_64/2006.0/RPMS/libnss3-devel-1.5.0.6-1.4.20060mdk.i586.rpm 74811077c91dde3bc8c8bae45e5862a7 x86_64/2006.0/RPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.x86_64.rpm 75711988a67bf3f36fc08823561bb2b7 x86_64/2006.0/RPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.x86_64.rpm 5bd9ad43769390549ab3c4549c971db7 x86_64/2006.0/RPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.x86_64.rpm dfdd808e2ec0866c15db5f1ea6a5b5bd x86_64/2006.0/RPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.x86_64.rpm 1fad19f458ce0aa50e86710ed3b7fe04 x86_64/2006.0/RPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.x86_64.rpm 743e8d4f009ab2d2fc2e8c131244fb57 x86_64/2006.0/RPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.x86_64.rpm 476ee9a87f650a0ef3523a9619f9f611 x86_64/2006.0/RPMS/mozilla-firefox-devel-1.5.0.6-1.4.20060mdk.x86_64.rpm be48721cbc6e5634b50ce5b6cfe4a951 x86_64/2006.0/RPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.x86_64.rpm e56ce18466e20db3189e035329c606ce x86_64/2006.0/RPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.x86_64.rpm 489e5940c9ac9573842888ff07436e4c x86_64/2006.0/RPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.x86_64.rpm 73d2eb2fc6ec99a1d3eeb94d9ddff36e x86_64/2006.0/RPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.x86_64.rpm acbd3cd5f82b47a6c6cb03ebd6ca25ae x86_64/2006.0/RPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.x86_64.rpm 362807f9da1130dd8da606b9ded06311 x86_64/2006.0/RPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.x86_64.rpm e48c991fa555d22d1f382baa83dfcae9 x86_64/2006.0/RPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.x86_64.rpm 0d954f47de6d2cc58e36cd2c9ddae09c x86_64/2006.0/RPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.x86_64.rpm 8f615598d04985a0d60a3469ea3044ed x86_64/2006.0/RPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.x86_64.rpm f4810510feb31e6195358c5ddd87252f x86_64/2006.0/RPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.x86_64.rpm 537d53b7805ac84009f2ff99e3282b91 x86_64/2006.0/RPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.x86_64.rpm afbc9ee04902213758bbf262b732de21 x86_64/2006.0/RPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.x86_64.rpm dcef8c7676529394e5fbd4168f8e2cd6 x86_64/2006.0/RPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.x86_64.rpm f4ee0e7ecba430fd3ce5e8ebeda9b5c1 x86_64/2006.0/RPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.x86_64.rpm 778261355184ca73cbf1aab1ce56644d x86_64/2006.0/RPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.x86_64.rpm 10ca4e7f4cf10c380849ced0bf83e08b x86_64/2006.0/RPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.x86_64.rpm 427cabc08ec66e1a45bc27e5625f49bb x86_64/2006.0/RPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.x86_64.rpm de4e61d4fce7cd286bb4a3778cb8499f x86_64/2006.0/RPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.x86_64.rpm 86e9af4c42b59e32d4e5ac0a8d1afe30 x86_64/2006.0/RPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.x86_64.rpm 126b1e0826330986fbf485eabade949d x86_64/2006.0/RPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.x86_64.rpm d2e6da2db277b7f5dabed3e95d4b818b x86_64/2006.0/RPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.x86_64.rpm a83edee07d2465cf55024ed1b7aa779f x86_64/2006.0/RPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.x86_64.rpm 9e33e2a0c3d4a92a0b420c417fcd3469 x86_64/2006.0/RPMS/yelp-2.10.0-6.1.20060mdk.x86_64.rpm 60279919aa5f17c2ecd9f64db87cb952 x86_64/2006.0/SRPMS/devhelp-0.10-7.1.20060mdk.src.rpm c446c046409b6697a863868fe5c64222 x86_64/2006.0/SRPMS/epiphany-1.8.5-4.1.20060mdk.src.rpm e726300336f737c8952f664bf1866d6f x86_64/2006.0/SRPMS/galeon-2.0.1-1.1.20060mdk.src.rpm e9e30596eceb0bc9a03f7880cd7d14ea x86_64/2006.0/SRPMS/gnome-doc-utils-0.4.4-2.1.20060mdk.src.rpm 4168c73cba97276fa4868b4ac2c7eb19 x86_64/2006.0/SRPMS/mozilla-firefox-1.5.0.6-1.4.20060mdk.src.rpm 6a7df29f5af703d10d7ea1fee160ac00 x86_64/2006.0/SRPMS/mozilla-firefox-br-1.5.0.6-0.1.20060mdk.src.rpm e56e14c28051ec4332cbde8dbee7bb6a x86_64/2006.0/SRPMS/mozilla-firefox-ca-1.5.0.6-0.1.20060mdk.src.rpm 1a144c86fd8db39e2801117296e15d2b x86_64/2006.0/SRPMS/mozilla-firefox-cs-1.5.0.6-0.1.20060mdk.src.rpm f4889d2ee6e07c0141b57ab9aaccae64 x86_64/2006.0/SRPMS/mozilla-firefox-da-1.5.0.6-0.1.20060mdk.src.rpm dee0f7bc91c797e880fff19e1cb05a63 x86_64/2006.0/SRPMS/mozilla-firefox-de-1.5.0.6-0.1.20060mdk.src.rpm 45724f6ceed66701392bd131feaf1f6d x86_64/2006.0/SRPMS/mozilla-firefox-el-1.5.0.6-0.1.20060mdk.src.rpm cc680cac7fea3f7f8a48a5daf86db088 x86_64/2006.0/SRPMS/mozilla-firefox-es-1.5.0.6-0.1.20060mdk.src.rpm 69b04335c21313262af4253863109cc8 x86_64/2006.0/SRPMS/mozilla-firefox-fi-1.5.0.6-0.1.20060mdk.src.rpm 2aab89244a535afcbc25271df5d6b33f x86_64/2006.0/SRPMS/mozilla-firefox-fr-1.5.0.6-0.1.20060mdk.src.rpm f1c7f71d5484c5047b1b38fc16888ae3 x86_64/2006.0/SRPMS/mozilla-firefox-ga-1.5.0.6-0.1.20060mdk.src.rpm 3963e3c3a2c38c41d9d3bc5250b124a6 x86_64/2006.0/SRPMS/mozilla-firefox-he-1.5.0.6-0.1.20060mdk.src.rpm bb54aed17a126a9e8568d49866db99ea x86_64/2006.0/SRPMS/mozilla-firefox-hu-1.5.0.6-0.1.20060mdk.src.rpm 2a1b11f2c8944bc1fc0d313d54a903cf x86_64/2006.0/SRPMS/mozilla-firefox-it-1.5.0.6-0.1.20060mdk.src.rpm 783c5b3c0fb9916e07f220110155476d x86_64/2006.0/SRPMS/mozilla-firefox-ja-1.5.0.6-0.1.20060mdk.src.rpm 895e315731fa0b453045cc39da4f5358 x86_64/2006.0/SRPMS/mozilla-firefox-ko-1.5.0.6-0.1.20060mdk.src.rpm daa0a127d2a1a3641d4e97bfb95f1647 x86_64/2006.0/SRPMS/mozilla-firefox-nb-1.5.0.6-0.1.20060mdk.src.rpm 0c778b0738b11dfd5d68be48fa6316ed x86_64/2006.0/SRPMS/mozilla-firefox-nl-1.5.0.6-0.1.20060mdk.src.rpm 7025d0118cf29e39117bd87c586e84a3 x86_64/2006.0/SRPMS/mozilla-firefox-pl-1.5.0.6-0.1.20060mdk.src.rpm 5d8b8e869f588c0f5751e9ce7addba45 x86_64/2006.0/SRPMS/mozilla-firefox-pt_BR-1.5.0.6-0.1.20060mdk.src.rpm c5148674a8c7dd1f88c5729293f899ba x86_64/2006.0/SRPMS/mozilla-firefox-ro-1.5.0.6-0.1.20060mdk.src.rpm 91d490c075473e2443e383201b961cb8 x86_64/2006.0/SRPMS/mozilla-firefox-ru-1.5.0.6-0.1.20060mdk.src.rpm 622ae4619d151bb1634113e50b30fbac x86_64/2006.0/SRPMS/mozilla-firefox-sk-1.5.0.6-0.1.20060mdk.src.rpm e6d64c14929d299e2fb52e334ae6641a x86_64/2006.0/SRPMS/mozilla-firefox-sl-1.5.0.6-0.1.20060mdk.src.rpm 20f64c6dfd6aa1450cba5002d42f53d8 x86_64/2006.0/SRPMS/mozilla-firefox-sv-1.5.0.6-0.1.20060mdk.src.rpm b93a6b548bb1cf0f8cc46dec133e81a3 x86_64/2006.0/SRPMS/mozilla-firefox-tr-1.5.0.6-0.1.20060mdk.src.rpm f5603b65b3d10fa5083934e08d2d4560 x86_64/2006.0/SRPMS/mozilla-firefox-zh_CN-1.5.0.6-0.1.20060mdk.src.rpm c0e978ea92b4a8f3aa75dad5ab7588b9 x86_64/2006.0/SRPMS/mozilla-firefox-zh_TW-1.5.0.6-0.1.20060mdk.src.rpm 93cb0acaeddb095d13b37aeb0ab4dd49 x86_64/2006.0/SRPMS/yelp-2.10.0-6.1.20060mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFE41l0mqjQ0CJFipgRAu1DAJ90MqoteYoIfAj0Gqim5fxrvOw7BACg0xq5 L8QZWCg0xY3ZRacFzNTgusw= =gl6u -----END PGP SIGNATURE----- . ZDI-06-025: Mozilla Firefox Javascript navigator Object Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-025.html July 26, 2006 -- CVE ID: CVE-2006-3677 -- Affected Vendor: Mozilla -- Affected Products: Firefox 1.5.0 - 1.5.0.4 SeaMonkey 1.0 - 1.0.2 -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since July 26, 2006 by Digital Vaccine protection filter ID 4326. More information is detailed in MFSA2006-45: http://www.mozilla.org/security/announce/2006/mfsa2006-45.html -- Disclosure Timeline: 2006.06.16 - Vulnerability reported to vendor 2006.07.25 - Vulnerability information provided to ZDI security partners 2006.07.26 - Digital Vaccine released to TippingPoint customers 2006.07.26 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by an anonymous researcher. -- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product

Trust: 4.23

sources: NVD: CVE-2006-3677 // CERT/CC: VU#670060 // JVNDB: JVNDB-2006-000445 // ZDI: ZDI-06-025 // BID: 19181 // BID: 19192 // VULHUB: VHN-19785 // PACKETSTORM: 48662 // PACKETSTORM: 48661 // PACKETSTORM: 49029 // PACKETSTORM: 49032 // PACKETSTORM: 48601 // PACKETSTORM: 49350 // PACKETSTORM: 48641

AFFECTED PRODUCTS

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.2

Trust: 2.2

vendor:mozillamodel:seamonkeyscope:eqversion:1.0

Trust: 2.2

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.1

Trust: 2.2

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.4

Trust: 2.2

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.3

Trust: 2.2

vendor:mozillamodel:firefoxscope:eqversion:1.5

Trust: 2.2

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.2

Trust: 2.2

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.1

Trust: 2.2

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel:firefoxscope:lteversion:1.5.0.4

Trust: 0.8

vendor:mozillamodel:seamonkeyscope:lteversion:1.0.2

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:mozilla firefoxmodel:1.5.xscope: - version: -

Trust: 0.7

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.6

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.6

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.6

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.6

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.6

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.6

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.6

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.6

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.6

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.6

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.6

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.6

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.6

vendor:mozillamodel:firefox betascope:eqversion:1.52

Trust: 0.6

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.6

vendor:mozillamodel:seamonkeyscope:neversion:1.0.3

Trust: 0.6

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.6

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.6

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.6

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.6

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.6

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:mozillamodel:firefox betascope:eqversion:1.51

Trust: 0.6

vendor:redhatmodel:enterprise linux as ia64scope:eqversion:2.1

Trust: 0.6

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.6

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.6

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.6

vendor:mozillamodel:firefoxscope:neversion:1.5.0.5

Trust: 0.6

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.6

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.6

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.6

vendor:mozillamodel:seamonkey devscope:eqversion:1.0

Trust: 0.6

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.6

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.6

vendor:redhatmodel:enterprise linux asscope:eqversion:2.1

Trust: 0.6

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.8

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:1.5.0.4

Trust: 0.3

vendor:mozillamodel:thunderbird betascope:eqversion:1.52

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.8

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.04

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.1

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.6

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.2

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.2

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.1

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.7

Trust: 0.3

vendor:mozillamodel:firefox preview releasescope: - version: -

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.8

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.3

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.5

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.7

Trust: 0.3

vendor:sunmodel:solaris 10.0 x86scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.6

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.10.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.4

Trust: 0.3

vendor:mozillamodel:firefox rcscope:eqversion:0.9

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.04

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.04

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:0.9.3

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.0.5

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.0.7

Trust: 0.3

vendor:k meleonmodel:k-meleonscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.7.0

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8.4

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0.2

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8

Trust: 0.3

vendor:netscapemodel:browserscope:eqversion:8.1

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:1.0.1

Trust: 0.3

vendor:mozillamodel:caminoscope:eqversion:0.8.3

Trust: 0.3

vendor:flockmodel:flockscope:eqversion:0.7.32

Trust: 0.3

sources: CERT/CC: VU#670060 // ZDI: ZDI-06-025 // BID: 19181 // BID: 19192 // JVNDB: JVNDB-2006-000445 // CNNVD: CNNVD-200607-482 // NVD: CVE-2006-3677

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3677
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#670060
value: 58.14

Trust: 0.8

NVD: CVE-2006-3677
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200607-482
value: HIGH

Trust: 0.6

VULHUB: VHN-19785
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-3677
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-19785
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#670060 // VULHUB: VHN-19785 // JVNDB: JVNDB-2006-000445 // CNNVD: CNNVD-200607-482 // NVD: CVE-2006-3677

PROBLEMTYPE DATA

problemtype:CWE-16

Trust: 1.1

sources: VULHUB: VHN-19785 // NVD: CVE-2006-3677

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 48661 // CNNVD: CNNVD-200607-482

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-200607-482

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000445

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-19785

PATCH

title:mfsa2006-45url:http://www.mozilla.org/security/announce/2006/mfsa2006-45.html

Trust: 1.5

title:HPSBUX02153url:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742

Trust: 0.8

title:HPSBUX02153url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02153.html

Trust: 0.8

title:seamonkey (V2.x)url:http://www.miraclelinux.com/support/update/list.php?errata_id=984

Trust: 0.8

title:mfsa2006-45url:http://www.mozilla-japan.org/security/announce/2006/mfsa2006-45.html

Trust: 0.8

title:RHSA-2006:0608url:https://rhn.redhat.com/errata/RHSA-2006-0608.html

Trust: 0.8

title:RHSA-2006:0594url:https://rhn.redhat.com/errata/RHSA-2006-0594.html

Trust: 0.8

title:RHSA-2006:0610url:https://rhn.redhat.com/errata/RHSA-2006-0610.html

Trust: 0.8

title:RHSA-2006:0611url:https://rhn.redhat.com/errata/RHSA-2006-0611.html

Trust: 0.8

title:RHSA-2006:0609url:https://rhn.redhat.com/errata/RHSA-2006-0609.html

Trust: 0.8

title:RHSA-2006:0608url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0608J.html

Trust: 0.8

title:RHSA-2006:0594url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0594J.html

Trust: 0.8

title:RHSA-2006:0610url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0610J.html

Trust: 0.8

title:RHSA-2006:0611url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0611J.html

Trust: 0.8

title:RHSA-2006:0609url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0609J.html

Trust: 0.8

sources: ZDI: ZDI-06-025 // JVNDB: JVNDB-2006-000445

EXTERNAL IDS

db:NVDid:CVE-2006-3677

Trust: 4.4

db:BIDid:19181

Trust: 3.6

db:ZDIid:ZDI-06-025

Trust: 3.3

db:CERT/CCid:VU#670060

Trust: 3.3

db:BIDid:19192

Trust: 2.8

db:USCERTid:TA06-208A

Trust: 2.6

db:SECUNIAid:19873

Trust: 2.5

db:SECUNIAid:21216

Trust: 2.5

db:VUPENid:ADV-2006-2998

Trust: 1.7

db:VUPENid:ADV-2008-0083

Trust: 1.7

db:VUPENid:ADV-2006-3748

Trust: 1.7

db:SECUNIAid:21336

Trust: 1.7

db:SECUNIAid:22066

Trust: 1.7

db:SECUNIAid:21529

Trust: 1.7

db:SECUNIAid:21361

Trust: 1.7

db:SECUNIAid:21243

Trust: 1.7

db:SECUNIAid:21532

Trust: 1.7

db:SECUNIAid:21246

Trust: 1.7

db:SECUNIAid:21229

Trust: 1.7

db:SECUNIAid:21262

Trust: 1.7

db:SECUNIAid:21343

Trust: 1.7

db:SECUNIAid:21269

Trust: 1.7

db:SECUNIAid:22210

Trust: 1.7

db:SECUNIAid:21270

Trust: 1.7

db:SECTRACKid:1016587

Trust: 1.7

db:SECTRACKid:1016586

Trust: 1.7

db:SECUNIAid:21631

Trust: 1.1

db:USCERTid:SA06-208A

Trust: 0.8

db:JVNDBid:JVNDB-2006-000445

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-055

Trust: 0.7

db:CNNVDid:CNNVD-200607-482

Trust: 0.7

db:REDHATid:RHSA-2006:0609

Trust: 0.6

db:REDHATid:RHSA-2006:0608

Trust: 0.6

db:REDHATid:RHSA-2006:0611

Trust: 0.6

db:REDHATid:RHSA-2006:0594

Trust: 0.6

db:REDHATid:RHSA-2006:0610

Trust: 0.6

db:CONFIRMid:HTTP://WWW.MOZILLA.ORG/SECURITY/ANNOUNCE/2006/MFSA2006-45.HTML

Trust: 0.6

db:UBUNTUid:USN-354-1

Trust: 0.6

db:UBUNTUid:USN-327-1

Trust: 0.6

db:SUSEid:SUSE-SA:2006:048

Trust: 0.6

db:BUGTRAQid:20060726 ZDI-06-025: MOZILLA FIREFOX JAVASCRIPT NAVIGATOR OBJECT VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060727 RPSA-2006-0137-1 FIREFOX

Trust: 0.6

db:XFid:39998

Trust: 0.6

db:XFid:27981

Trust: 0.6

db:CERT/CCid:TA06-208A

Trust: 0.6

db:GENTOOid:GLSA-200608-02

Trust: 0.6

db:GENTOOid:GLSA-200608-03

Trust: 0.6

db:HPid:SSRT061181

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:145

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:143

Trust: 0.6

db:SGIid:20060703-01-P

Trust: 0.6

db:PACKETSTORMid:48641

Trust: 0.2

db:SEEBUGid:SSVID-70818

Trust: 0.1

db:SEEBUGid:SSVID-63754

Trust: 0.1

db:SEEBUGid:SSVID-66996

Trust: 0.1

db:EXPLOIT-DBid:2082

Trust: 0.1

db:EXPLOIT-DBid:9946

Trust: 0.1

db:EXPLOIT-DBid:16300

Trust: 0.1

db:PACKETSTORMid:82262

Trust: 0.1

db:PACKETSTORMid:48773

Trust: 0.1

db:VULHUBid:VHN-19785

Trust: 0.1

db:PACKETSTORMid:48662

Trust: 0.1

db:PACKETSTORMid:48661

Trust: 0.1

db:PACKETSTORMid:49029

Trust: 0.1

db:PACKETSTORMid:49032

Trust: 0.1

db:SECUNIAid:21228

Trust: 0.1

db:PACKETSTORMid:48601

Trust: 0.1

db:PACKETSTORMid:49350

Trust: 0.1

sources: CERT/CC: VU#670060 // ZDI: ZDI-06-025 // VULHUB: VHN-19785 // BID: 19181 // BID: 19192 // JVNDB: JVNDB-2006-000445 // PACKETSTORM: 48662 // PACKETSTORM: 48661 // PACKETSTORM: 49029 // PACKETSTORM: 49032 // PACKETSTORM: 48601 // PACKETSTORM: 49350 // PACKETSTORM: 48641 // CNNVD: CNNVD-200607-482 // NVD: CVE-2006-3677

REFERENCES

url:http://www.securityfocus.com/bid/19181

Trust: 3.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-45.html

Trust: 3.2

url:http://www.zerodayinitiative.com/advisories/zdi-06-025.html

Trust: 2.6

url:http://www.securityfocus.com/bid/19192

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta06-208a.html

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/670060

Trust: 2.5

url:http://rhn.redhat.com/errata/rhsa-2006-0609.html

Trust: 2.3

url:http://security.gentoo.org/glsa/glsa-200608-02.xml

Trust: 1.8

url:https://issues.rpath.com/browse/rpl-536

Trust: 1.7

url:http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:143

Trust: 1.7

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:145

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2006-0594.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2006-0608.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2006-0610.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2006-0611.html

Trust: 1.7

url:http://securitytracker.com/id?1016586

Trust: 1.7

url:http://securitytracker.com/id?1016587

Trust: 1.7

url:http://secunia.com/advisories/19873

Trust: 1.7

url:http://secunia.com/advisories/21216

Trust: 1.7

url:http://secunia.com/advisories/21229

Trust: 1.7

url:http://secunia.com/advisories/21243

Trust: 1.7

url:http://secunia.com/advisories/21246

Trust: 1.7

url:http://secunia.com/advisories/21262

Trust: 1.7

url:http://secunia.com/advisories/21269

Trust: 1.7

url:http://secunia.com/advisories/21270

Trust: 1.7

url:http://secunia.com/advisories/21336

Trust: 1.7

url:http://secunia.com/advisories/21343

Trust: 1.7

url:http://secunia.com/advisories/21361

Trust: 1.7

url:http://secunia.com/advisories/21529

Trust: 1.7

url:http://secunia.com/advisories/21532

Trust: 1.7

url:http://secunia.com/advisories/22210

Trust: 1.7

url:ftp://patches.sgi.com/support/free/security/advisories/20060703-01-u.asc

Trust: 1.7

url:http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-354-1

Trust: 1.7

url:http://www.mozilla.org/security/announce/2006/mfsa2006-44.html

Trust: 1.2

url:http://www.securityfocus.com/archive/1/441332/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/441333/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/446658/100/200/threaded

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10745

Trust: 1.1

url:http://secunia.com/advisories/21631

Trust: 1.1

url:http://secunia.com/advisories/22066

Trust: 1.1

url:https://usn.ubuntu.com/327-1/

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/2998

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3748

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0083

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/39998

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27981

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3677

Trust: 1.1

url:http://secunia.com/advisories/19873/

Trust: 0.9

url:https://bugzilla.mozilla.org/show_bug.cgi?id=342267

Trust: 0.8

url:http://secunia.com/advisories/21216/

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-208a/

Trust: 0.8

url:http://jvn.jp/tr/trta06-208a/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-3677

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa06-208a.html

Trust: 0.8

url:http://rhn.redhat.com/errata/rhsa-2006-0608.html

Trust: 0.6

url:http://rhn.redhat.com/errata/rhsa-2006-0594.html

Trust: 0.6

url:http://rhn.redhat.com/errata/rhsa-2006-0610.html

Trust: 0.6

url:http://rhn.redhat.com/errata/rhsa-2006-0611.html

Trust: 0.6

url:/archive/1/441333

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/2998

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27981

Trust: 0.6

url:http://www.ubuntulinux.org/support/documentation/usn/usn-327-1

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441333/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441332/100/0/threaded

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:145

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:143

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/39998

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0083

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3748

Trust: 0.6

url:http://www.mozilla.org/security/announce/2006/mfsa2006-46.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-47.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-48.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-49.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-50.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-51.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-52.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-53.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-54.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-55.html

Trust: 0.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-56.html

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2006-3677

Trust: 0.4

url:http://r.your.hp.com/r/c/r?1.1.hx.dc.w2ce*.ctgd3g..t.e4wu.1_wg.31xxao

Trust: 0.3

url:http://r.your.hp.com/r/c/r?1.1.hx.dc.w2ce*.ctgd3g..t.e4ww.1_wg.31u1aq

Trust: 0.3

url:http://secunia.com/secunia_research/2006-53/advisory/

Trust: 0.3

url:http://lists.grok.org.uk

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1

Trust: 0.3

url:https://www.it-isac.org/postings/cyber/uscertalerts.php

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-155.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-311.htm

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1188588104897+28353475&docid=c00771742

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475&docid=c00774579

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1188583914532+28353475&docid=c00774579

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1&searchclause=

Trust: 0.3

url:http://browserfun.blogspot.com/2006/07/mobb-28-mozilla-navigator-object.html

Trust: 0.3

url:/archive/1/441332

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-3803

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3810

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3113

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3809

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3802

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3808

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3806

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3812

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3801

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3811

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3805

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3807

Trust: 0.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3803

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-3113

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3801

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3806

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3811

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3805

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3804

Trust: 0.2

url:http://bugs.gentoo.org.

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3804

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3809

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3812

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dbg_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/mozilla-firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/mozilla-firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-dev_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox-gnome-support_1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5.orig.tar.gz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3810

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3802

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr4_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss3_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnss-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/libnspr-dev_1.firefox1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/f/firefox/firefox_1.5.dfsg+1.5.0.5-0ubuntu6.06.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/f/firefox/firefox-dom-inspector_1.5.dfsg+1.5.0.5-0ubuntu6.06_amd64.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3808

Trust: 0.1

url:http://www.mozilla.org/security/announce/>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/browser_security.html#mozilla_firefox>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=firefox_1505>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3806>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-208a.html>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3803>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3811>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3113>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3801>

Trust: 0.1

url:http://www.mozilla.org/projects/security/known-vulnerabilities.html>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3677>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3805>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3804>

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3807>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200608-03.xml

Trust: 0.1

url:http://secunia.com/product/9735/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/21228/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/2637/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/4652/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2786

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-37.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2787

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2775

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-34.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2780

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2785

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2777

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2785

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2776

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2784

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2779

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-39.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2788

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2777

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-36.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-35.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2786

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2778

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-33.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-42.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-41.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2782

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2779

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2784

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2775

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2894

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-31.html

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-32.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2613

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-43.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2780

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2787

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-2894

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-38.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2613

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: CERT/CC: VU#670060 // ZDI: ZDI-06-025 // VULHUB: VHN-19785 // BID: 19181 // BID: 19192 // JVNDB: JVNDB-2006-000445 // PACKETSTORM: 48662 // PACKETSTORM: 48661 // PACKETSTORM: 49029 // PACKETSTORM: 49032 // PACKETSTORM: 48601 // PACKETSTORM: 49350 // PACKETSTORM: 48641 // CNNVD: CNNVD-200607-482 // NVD: CVE-2006-3677

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-06-025

SOURCES

db:CERT/CCid:VU#670060
db:ZDIid:ZDI-06-025
db:VULHUBid:VHN-19785
db:BIDid:19181
db:BIDid:19192
db:JVNDBid:JVNDB-2006-000445
db:PACKETSTORMid:48662
db:PACKETSTORMid:48661
db:PACKETSTORMid:49029
db:PACKETSTORMid:49032
db:PACKETSTORMid:48601
db:PACKETSTORMid:49350
db:PACKETSTORMid:48641
db:CNNVDid:CNNVD-200607-482
db:NVDid:CVE-2006-3677

LAST UPDATE DATE

2024-11-08T19:27:19.838000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#670060date:2007-02-09T00:00:00
db:ZDIid:ZDI-06-025date:2006-07-26T00:00:00
db:VULHUBid:VHN-19785date:2018-10-18T00:00:00
db:BIDid:19181date:2007-09-05T15:42:00
db:BIDid:19192date:2007-09-05T02:11:00
db:JVNDBid:JVNDB-2006-000445date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200607-482date:2006-08-26T00:00:00
db:NVDid:CVE-2006-3677date:2018-10-18T16:48:49.630

SOURCES RELEASE DATE

db:CERT/CCid:VU#670060date:2006-07-27T00:00:00
db:ZDIid:ZDI-06-025date:2006-07-26T00:00:00
db:VULHUBid:VHN-19785date:2006-07-27T00:00:00
db:BIDid:19181date:2006-07-26T00:00:00
db:BIDid:19192date:2006-07-26T00:00:00
db:JVNDBid:JVNDB-2006-000445date:2007-04-01T00:00:00
db:PACKETSTORMid:48662date:2006-07-28T03:34:15
db:PACKETSTORMid:48661date:2006-07-28T03:32:28
db:PACKETSTORMid:49029date:2006-08-17T08:49:38
db:PACKETSTORMid:49032date:2006-08-17T08:57:00
db:PACKETSTORMid:48601date:2006-07-28T01:04:26
db:PACKETSTORMid:49350date:2006-08-27T17:51:09
db:PACKETSTORMid:48641date:2006-07-28T02:51:08
db:CNNVDid:CNNVD-200607-482date:2006-07-27T00:00:00
db:NVDid:CVE-2006-3677date:2006-07-27T19:04:00