CVE-2006-3806

NameCVE-2006-3806
DescriptionMultiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1159, DSA-1160, DSA-1161

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid125.0.1-2fixed
thunderbird (PTS)buster1:91.12.0-1~deb10u1fixed
buster (security)1:115.9.0-1~deb10u1fixed
bullseye1:115.7.0-1~deb11u1fixed
bullseye (security)1:115.9.0-1~deb11u1fixed
bookworm1:115.7.0-1~deb12u1fixed
bookworm (security)1:115.9.0-1~deb12u1fixed
sid1:115.9.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)1.5.dfsg+1.5.0.5-1high
mozillasourcesarge2:1.7.8-1sarge7.2.2DSA-1160
mozillasource(unstable)(unfixed)high
mozilla-firefoxsourcesarge1.0.4-2sarge11DSA-1161
mozilla-firefoxsource(unstable)(unfixed)high
mozilla-thunderbirdsourcesarge1.0.2-2.sarge1.0.8b.1DSA-1159
mozilla-thunderbirdsource(unstable)(unfixed)medium
thunderbirdsource(unstable)1.5.0.5-1medium
xulrunnersource(unstable)1.8.0.5-1high

Notes

MFSA-2006-50

Search for package or bug name: Reporting problems