CVE-2006-3806

NameCVE-2006-3806
DescriptionMultiple integer overflows in the Javascript engine in Mozilla Firefox before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code via vectors involving (1) long strings in the toSource method of the Object, Array, and String objects; and (2) unspecified "string function arguments."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1159, DSA-1160, DSA-1161
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid47.0-1fixed
xulrunner (PTS)wheezy (security), wheezy24.8.1esr-2~deb7u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)1.5.dfsg+1.5.0.5-1high
mozillasource(unstable)(unfixed)high
mozillasourcesarge2:1.7.8-1sarge7.2.2highDSA-1160
mozilla-firefoxsource(unstable)(unfixed)high
mozilla-firefoxsourcesarge1.0.4-2sarge11highDSA-1161
mozilla-thunderbirdsource(unstable)(unfixed)medium
mozilla-thunderbirdsourcesarge1.0.2-2.sarge1.0.8b.1highDSA-1159
thunderbirdsource(unstable)1.5.0.5-1medium
xulrunnersource(unstable)1.8.0.5-1high

Notes

MFSA-2006-50

Search for package or bug name: Reporting problems