CVE-2006-5159
Published Oct 5, 2006
Last updated 3 months ago
Overview
- Description
- Stack-based buffer overflow in Mozilla Firefox allows remote attackers to execute arbitrary code via unspecified vectors involving JavaScript. NOTE: the vendor and original researchers have released a follow-up comment disputing the severity of this issue, in which the researcher states that "we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this... I have not succeeded in making this code do anything more than cause a crash and eat up system resources"
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Vendor comments
- Red HatRed Hat does not consider this issue to be a security vulnerability. We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat. In the event more information becomes available, we will revisit this issue in the future.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93C142C5-3A85-432B-80D6-2E7B1B4694F4" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2434FCE7-A50B-4527-9970-C7224B31141C" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5633FB6E-D623-49D4-9858-4E20E64DE458" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "429ECA02-DBCD-45FB-942C-CA4BC1BC8A72" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5F0DC80-5473-465C-9D7F-9589F1B78E12" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "567FF916-7DE0-403C-8528-7931A43E0D18" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "010B34F4-910E-4515-990B-8E72DF009578" }, { "criteria": "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FAA1A89-E8D9-46D0-8E2C-9259920ACBFE" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A545A77-2198-4685-A87F-E0F2DAECECF6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "778FAE0C-A5CF-4B67-93A9-1A803E3E699F" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7447185-7509-449D-8907-F30A42CF7EB5" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EDBAC37-9D08-44D1-B279-BC6ACF126CAF" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FFF89FA-2020-43CC-BACD-D66117B3DD26" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "834BB391-5EB5-43A8-980A-D305EDAE6FA7" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A38AD88-BAA6-4FBE-885B-69E951BD1EFE" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B500EE6C-99DB-49A3-A1F1-AFFD7FE28068" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F2938F2-A801-45E5-8E06-BE03DE03C8A7" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABB88E86-6E83-4A59-9266-8B98AA91774D" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E19ED1CA-DEBD-4786-BA7B-C122C7D2E5B7" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66BE50FE-EA21-4633-A181-CD35196DF06E" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D6BF5B1-86D1-47FE-9D9C-735718F94874" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84D15CE0-69DF-4EFD-801E-96A4D6AABEDB" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C30ACBCA-4FA1-46DE-8F15-4830BC27E160" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9453EF65-7C69-449E-BF7C-4FECFB56713E" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AA75825-21CF-475B-8040-126A13FA2216" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA97C80E-17FA-4866-86CE-29886145ED80" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DE24BED-202E-416D-B5F2-8207D97B9939" }, { "criteria": "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04198E04-CE1D-4A5A-A20C-D1E135B45F94" }, { "criteria": "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61EA4A1-1916-48A5-8196-E3CDEF3108F6" }, { "criteria": "cpe:2.3:a:mozilla:firefox:preview_release:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFDBA992-46F8-42A6-9428-C9E475CA69E3" } ], "operator": "OR" } ] } ]