Overview
Mozilla can allow persisted XUL attributes to associate with the wrong URL. This may allow a remote attacker to execute arbitrary code.
Description
XUL XUL is an XML-based user interface language, which is used by Mozilla. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Mozilla Foundation Security Advisory for reporting this vulnerability, who in turn credit Jonas Sicking.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2006-2775 |
Severity Metric: | 11.48 |
Date Public: | 2006-06-01 |
Date First Published: | 2006-06-02 |
Date Last Updated: | 2007-02-09 14:36 UTC |
Document Revision: | 14 |