CVE-2006-3806

NameCVE-2006-3806
DescriptionMultiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1159, DSA-1160, DSA-1161
NVD severityhigh (attack range: remote)
Debian/oldoldstablenot known to be vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot known to be vulnerable.
Debian/testingnot known to be vulnerable.
Debian/unstablenot known to be vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xulrunner (PTS)wheezy (security), wheezy24.8.1esr-2~deb7u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)1.5.dfsg+1.5.0.5-1high
mozillasource(unstable)(unfixed)high
mozillasourcesarge2:1.7.8-1sarge7.2.2highDSA-1160
mozilla-firefoxsource(unstable)(unfixed)high
mozilla-firefoxsourcesarge1.0.4-2sarge11highDSA-1161
mozilla-thunderbirdsource(unstable)(unfixed)medium
mozilla-thunderbirdsourcesarge1.0.2-2.sarge1.0.8b.1highDSA-1159
thunderbirdsource(unstable)1.5.0.5-1medium
xulrunnersource(unstable)1.8.0.5-1high

Notes

MFSA-2006-50

Search for package or bug name: Reporting problems