Description
Heap-based buffer overflow in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a JavaScript regular expression with a "minimal quantifier."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1191-1 | New Mozilla Thunderbird packages fix several vulnerabilities |
Debian DSA |
DSA-1192-1 | New Mozilla packages fix several vulnerabilities |
Debian DSA |
DSA-1210-1 | New Mozilla Firefox packages fix several vulnerabilities |
Ubuntu USN |
USN-350-1 | Thunderbird vulnerabilities |
Ubuntu USN |
USN-351-1 | firefox vulnerabilities |
Ubuntu USN |
USN-352-1 | Thunderbird vulnerabilities |
Ubuntu USN |
USN-361-1 | Mozilla vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T19:14:47.491Z
Reserved: 2006-09-06T00:00:00.000Z
Link: CVE-2006-4565
No data.
Status : Modified
Published: 2006-09-15T18:07:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-4565
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN