Vulnerability Description
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 1.5.0.3 |
| Mozilla | Thunderbird | <= 1.5.0.3 |
References
- http://rhn.redhat.com/errata/RHSA-2006-0609.html
- http://secunia.com/advisories/20376
- http://secunia.com/advisories/20382
- http://secunia.com/advisories/20561
- http://secunia.com/advisories/20709
- http://secunia.com/advisories/21134
- http://secunia.com/advisories/21176
- http://secunia.com/advisories/21178
- http://secunia.com/advisories/21183
- http://secunia.com/advisories/21188
- http://secunia.com/advisories/21210
- http://secunia.com/advisories/21269
- http://secunia.com/advisories/21270
- http://secunia.com/advisories/21324
- http://secunia.com/advisories/21336
FAQ
What is CVE-2006-2778?
CVE-2006-2778 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes...
How severe is CVE-2006-2778?
CVE-2006-2778 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2778?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.