Overview
Mozilla products contain a memory corruption vulnerability related to SVG processing. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Scalable Vector Graphics (SVG) processing code in Mozilla Firefox and SeaMonkey contains a memory corruption vulnerability. According to Mozilla Foundation Security Advisory 2006-73: Appending an SVG comment DOM node from one document into another type of document such as HTML in some cases results in a crash due to memory corruption that can be exploited to run arbitrary code. |
Impact
By convincing a user to visit a specially crafted website, a remote, unauthenticated attacker may be able to execute arbitrary code. |
Solution
Upgrade
|
Workaround |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.mozilla.org/security/announce/2006/mfsa2006-73.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-051.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=360021
- http://secunia.com/advisories/23420/
- http://secunia.com/advisories/23591/
- http://secunia.com/advisories/23598/
- http://secunia.com/advisories/23439/
- http://secunia.com/advisories/23514/
- http://secunia.com/advisories/23545/
- http://secunia.com/advisories/23601/
- http://secunia.com/advisories/23614/
- http://secunia.com/advisories/23618/
- http://secunia.com/advisories/23692/
- http://www.securityfocus.com/bid/21668
Acknowledgements
This vulnerability was reported by Mozilla who in turn credits TippingPoint and the Zero Day Initiative.
This document was written by Katie Steiner.
Other Information
CVE IDs: | CVE-2006-6504 |
Severity Metric: | 26.78 |
Date Public: | 2006-12-19 |
Date First Published: | 2006-12-20 |
Date Last Updated: | 2007-02-07 18:37 UTC |
Document Revision: | 33 |