Overview
Mozilla products fail to properly restrict access to a JavaScript functions cloned parent. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.
Description
According to Mozilla Foundation Security Advisory 2006-15: it was possible to use the Object.watch() method to access an internal function object (the "clone parent") which could then be used to run arbitrary JavaScript code with full permission. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. |
Solution
Upgrade |
Disable JavaScript
|
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was reported in Mozilla Foundation Security Advisory 2006-15. Mozilla credits shutdown with providing information regarding this issue.
This document was written by Jeff Gennari.
Other Information
| CVE IDs: | CVE-2006-1734 |
| Severity Metric: | 20.45 |
| Date Public: | 2006-04-13 |
| Date First Published: | 2006-04-17 |
| Date Last Updated: | 2006-05-17 12:36 UTC |
| Document Revision: | 21 |