FKIE_CVE-2006-2778

Vulnerability from fkie_nvd - Published: 2006-06-02 18:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2006-0609.html
cve@mitre.orghttp://secunia.com/advisories/20376
cve@mitre.orghttp://secunia.com/advisories/20382
cve@mitre.orghttp://secunia.com/advisories/20561
cve@mitre.orghttp://secunia.com/advisories/20709
cve@mitre.orghttp://secunia.com/advisories/21134
cve@mitre.orghttp://secunia.com/advisories/21176
cve@mitre.orghttp://secunia.com/advisories/21178
cve@mitre.orghttp://secunia.com/advisories/21183
cve@mitre.orghttp://secunia.com/advisories/21188
cve@mitre.orghttp://secunia.com/advisories/21210
cve@mitre.orghttp://secunia.com/advisories/21269
cve@mitre.orghttp://secunia.com/advisories/21270
cve@mitre.orghttp://secunia.com/advisories/21324
cve@mitre.orghttp://secunia.com/advisories/21336
cve@mitre.orghttp://secunia.com/advisories/21532
cve@mitre.orghttp://secunia.com/advisories/21607
cve@mitre.orghttp://secunia.com/advisories/21631
cve@mitre.orghttp://secunia.com/advisories/22065
cve@mitre.orghttp://secunia.com/advisories/22066
cve@mitre.orghttp://securitytracker.com/id?1016202
cve@mitre.orghttp://securitytracker.com/id?1016214
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1118
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1120
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1134
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
cve@mitre.orghttp://www.kb.cert.org/vuls/id/421529US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:143
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:145
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:146
cve@mitre.orghttp://www.mozilla.org/security/announce/2006/mfsa2006-38.html
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_35_mozilla.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0578.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0594.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0610.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0611.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/435795/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/446657/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/446658/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/18228
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-153A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2106
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3748
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3749
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0058
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0083
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26849
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703
cve@mitre.orghttps://usn.ubuntu.com/296-1/
cve@mitre.orghttps://usn.ubuntu.com/296-2/
cve@mitre.orghttps://usn.ubuntu.com/297-1/
cve@mitre.orghttps://usn.ubuntu.com/297-3/
cve@mitre.orghttps://usn.ubuntu.com/323-1/
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2006-0609.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20376
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20382
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20561
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20709
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21134
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21176
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21178
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21183
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21188
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21210
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21269
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21324
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21336
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21532
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21607
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21631
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22065
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22066
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016202
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016214
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1118
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1120
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1134
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/421529US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:146
af854a3a-2127-422b-91ae-364da2661108http://www.mozilla.org/security/announce/2006/mfsa2006-38.html
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_35_mozilla.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0578.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0594.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0610.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0611.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/435795/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/446657/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/446658/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18228
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-153A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2106
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3748
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3749
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0058
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0083
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26849
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/296-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/296-2/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/297-1/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/297-3/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/323-1/
Impacted products
Vendor Product Version
mozilla firefox *
mozilla thunderbird *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5879A639-89D1-4D9C-9D97-DDA6AB862271",
              "versionEndIncluding": "1.5.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80D96C6-E20A-48C4-B9E3-2452B9742F1D",
              "versionEndIncluding": "1.5.0.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The crypto.signText function in Mozilla Firefox and Thunderbird before 1.5.0.4 allows remote attackers to execute arbitrary code via certain optional Certificate Authority name arguments, which causes an invalid array index and triggers a buffer overflow."
    }
  ],
  "evaluatorSolution": "Fixed in: Firefox 1.5.0.4\r\n  Thunderbird 1.5.0.4\r\n  SeaMonkey 1.0.2",
  "id": "CVE-2006-2778",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-02T18:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20376"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20382"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20561"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20709"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21134"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21176"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21178"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21183"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21188"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21210"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21269"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21270"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21324"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21336"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21532"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21607"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21631"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22066"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016202"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016214"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1118"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1120"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1134"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/421529"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:146"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-38.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/435795/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18228"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-153A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3748"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3749"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0058"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0083"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26849"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/296-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/296-2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/297-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/297-3/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/323-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21183"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102763-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1134"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-12.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/421529"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:146"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mozilla.org/security/announce/2006/mfsa2006-38.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_35_mozilla.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0578.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0594.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0610.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/435795/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/446658/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-153A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3749"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26849"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9703"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/296-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/296-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/297-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/297-3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/323-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…