Vulnerability Description
Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 1.5.0.6 |
| Mozilla | Seamonkey | <= 1.0.4 |
| Mozilla | Thunderbird | <= 1.5.0.6 |
Related Weaknesses (CWE)
References
- ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
- http://secunia.com/advisories/21906PatchVendor Advisory
- http://secunia.com/advisories/21915
- http://secunia.com/advisories/21916
- http://secunia.com/advisories/21939
- http://secunia.com/advisories/21940
- http://secunia.com/advisories/21949PatchVendor Advisory
- http://secunia.com/advisories/21950
- http://secunia.com/advisories/22001
- http://secunia.com/advisories/22025
- http://secunia.com/advisories/22036
- http://secunia.com/advisories/22055
- http://secunia.com/advisories/22056
- http://secunia.com/advisories/22066
- http://secunia.com/advisories/22074
FAQ
What is CVE-2006-4565?
CVE-2006-4565 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute a...
How severe is CVE-2006-4565?
CVE-2006-4565 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4565?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird.