Multiple vulnerabilities in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Javascript that leads to memory corruption, including (1) nsListControlFrame::FireMenuItemActiveEvent, (2) buffer overflows in the string class in out-of-memory conditions, (3) table row and column groups, (4) "anonymous box selectors outside of UA stylesheets," (5) stale references to "removed nodes," and (6) running the crypto.generateCRMFRequest callback on deleted context.
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0609.html cve-icon cve-icon
http://secunia.com/advisories/19873 cve-icon cve-icon
http://secunia.com/advisories/21216 cve-icon cve-icon
http://secunia.com/advisories/21228 cve-icon cve-icon
http://secunia.com/advisories/21229 cve-icon cve-icon
http://secunia.com/advisories/21243 cve-icon cve-icon
http://secunia.com/advisories/21246 cve-icon cve-icon
http://secunia.com/advisories/21250 cve-icon cve-icon
http://secunia.com/advisories/21262 cve-icon cve-icon
http://secunia.com/advisories/21269 cve-icon cve-icon
http://secunia.com/advisories/21270 cve-icon cve-icon
http://secunia.com/advisories/21275 cve-icon cve-icon
http://secunia.com/advisories/21336 cve-icon cve-icon
http://secunia.com/advisories/21343 cve-icon cve-icon
http://secunia.com/advisories/21358 cve-icon cve-icon
http://secunia.com/advisories/21361 cve-icon cve-icon
http://secunia.com/advisories/21529 cve-icon cve-icon
http://secunia.com/advisories/21532 cve-icon cve-icon
http://secunia.com/advisories/21607 cve-icon cve-icon
http://secunia.com/advisories/21631 cve-icon cve-icon
http://secunia.com/advisories/21675 cve-icon cve-icon
http://secunia.com/advisories/22055 cve-icon cve-icon
http://secunia.com/advisories/22065 cve-icon cve-icon
http://secunia.com/advisories/22066 cve-icon cve-icon
http://secunia.com/advisories/22210 cve-icon cve-icon
http://secunia.com/advisories/22342 cve-icon cve-icon
http://secunia.com/advisories/25839 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200608-02.xml cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200608-04.xml cve-icon cve-icon
http://securitytracker.com/id?1016586 cve-icon cve-icon
http://securitytracker.com/id?1016587 cve-icon cve-icon
http://securitytracker.com/id?1016588 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102971-1 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1161 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml cve-icon cve-icon
http://www.kb.cert.org/vuls/id/527676 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146 cve-icon cve-icon
http://www.mozilla.org/security/announce/2006/mfsa2006-55.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0594.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0608.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0610.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0611.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/441333/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/446657/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/446658/100/200/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/19181 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-350-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-354-1 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-361-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA06-208A.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2998 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3748 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3749 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2350 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0083 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27992 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-536 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-537 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-3811 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9934 cve-icon cve-icon
https://usn.ubuntu.com/327-1/ cve-icon cve-icon
https://usn.ubuntu.com/329-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-3811 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2006-07-27T20:00:00

Updated: 2024-08-07T18:48:38.197Z

Reserved: 2006-07-24T00:00:00

Link: CVE-2006-3811

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-07-27T20:04:00.000

Modified: 2024-11-21T00:14:29.043

Link: CVE-2006-3811

cve-icon Redhat

Severity : Critical

Publid Date: 2006-07-26T00:00:00Z

Links: CVE-2006-3811 - Bugzilla