The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.
References
Link Resource
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 Broken Link
http://secunia.com/advisories/23282 Broken Link Third Party Advisory
http://secunia.com/advisories/23420 Broken Link Third Party Advisory
http://secunia.com/advisories/23422 Broken Link Third Party Advisory
http://secunia.com/advisories/23545 Broken Link Third Party Advisory
http://secunia.com/advisories/23589 Broken Link Third Party Advisory
http://secunia.com/advisories/23591 Broken Link Third Party Advisory
http://secunia.com/advisories/23614 Broken Link Third Party Advisory
http://secunia.com/advisories/23672 Broken Link Third Party Advisory
http://secunia.com/advisories/23692 Broken Link Third Party Advisory
http://secunia.com/advisories/23988 Broken Link Third Party Advisory
http://secunia.com/advisories/24078 Broken Link Third Party Advisory
http://secunia.com/advisories/24390 Broken Link Third Party Advisory
http://security.gentoo.org/glsa/glsa-200701-02.xml Broken Link Third Party Advisory
http://securitytracker.com/id?1017398 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017405 Broken Link Third Party Advisory VDB Entry
http://securitytracker.com/id?1017406 Broken Link Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102846-1 Broken Link
http://www.debian.org/security/2007/dsa-1253 Third Party Advisory
http://www.debian.org/security/2007/dsa-1258 Third Party Advisory
http://www.debian.org/security/2007/dsa-1265 Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml Third Party Advisory
http://www.kb.cert.org/vuls/id/427972 Third Party Advisory US Government Resource
http://www.mozilla.org/security/announce/2006/mfsa2006-68.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_80_mozilla.html Broken Link
http://www.novell.com/linux/security/advisories/2007_06_mozilla.html Broken Link
http://www.securityfocus.com/bid/21668 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-398-1 Third Party Advisory
http://www.ubuntu.com/usn/usn-398-2 Third Party Advisory
http://www.ubuntu.com/usn/usn-400-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA06-354A.html Broken Link Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/5068 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2007/1124 Broken Link Third Party Advisory
http://www.vupen.com/english/advisories/2008/0083 Broken Link Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2006-12-20T01:00:00

Updated: 2006-12-22T10:00:00

Reserved: 2006-12-13T00:00:00


Link: CVE-2006-6499

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2006-12-20T01:28:00.000

Modified: 2023-12-22T18:49:53.110


Link: CVE-2006-6499

JSON object: View

cve-icon Redhat Information

No data.

CWE