Description
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1046-1 | New Mozilla packages fix several vulnerabilities |
Debian DSA |
DSA-1051-1 | New Mozilla Thunderbird packages fix several vulnerabilities |
Ubuntu USN |
USN-276-1 | Thunderbird vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T16:48:56.648Z
Reserved: 2006-02-24T00:00:00.000Z
Link: CVE-2006-0884
No data.
Status : Modified
Published: 2006-02-24T22:02:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-0884
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN