Vulnerabilities > CVE-2006-1993 - Resource Management Errors vulnerability in Mozilla Firefox 1.5.0.2

047910
CVSS 5.1 - MEDIUM
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
high complexity
mozilla
CWE-399
nessus
exploit available

Summary

Mozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.

Vulnerable Configurations

Part Description Count
Application
Mozilla
1

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionMozilla Firefox <= 1.5.0.2 (js320.dll/xpcom_core.dll) Denial of Service PoC. CVE-2006-1993. Dos exploits for multiple platform
idEDB-ID:1716
last seen2016-01-31
modified2006-04-24
published2006-04-24
reportersplices
sourcehttps://www.exploit-db.com/download/1716/
titleMozilla Firefox <= 1.5.0.2 js320.dll/xpcom_core.dll Denial of Service PoC

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200605-06.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200605-06 (Mozilla Firefox: Potential remote code execution) Martijn Wargers and Nick Mott discovered a vulnerability when rendering malformed JavaScript content. The Mozilla Firefox 1.0 line is not affected. Impact : If JavaScript is enabled, by tricking a user into visiting a malicious web page which would send a specially crafted HTML script that contains references to deleted objects with the
    last seen2020-06-01
    modified2020-06-02
    plugin id21348
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21348
    titleGLSA-200605-06 : Mozilla Firefox: Potential remote code execution
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_E2476979DA7411DAA67B0013D4A4A40E.NASL
    descriptionA Mozilla Foundation Security Advisory reports for deleted object reference when designMode=
    last seen2020-06-01
    modified2020-06-02
    plugin id21523
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21523
    titleFreeBSD : firefox -- denial of service vulnerability (e2476979-da74-11da-a67b-0013d4a4a40e)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1053.NASL
    descriptionMartijn Wargers and Nick Mott described crashes of Mozilla due to the use of a deleted controller context. In theory this could be abused to execute malicious code.
    last seen2020-06-01
    modified2020-06-02
    plugin id22595
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22595
    titleDebian DSA-1053-1 : mozilla - programming error
  • NASL familyWindows
    NASL idMOZILLA_FIREFOX_1503.NASL
    descriptionThe installed version of Firefox may allow a malicious site to crash the browser and potentially to run malicious code when attempting to use a deleted controller context. Successful exploitation requires that
    last seen2020-06-01
    modified2020-06-02
    plugin id21322
    published2006-05-04
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21322
    titleFirefox < 1.5.0.3 iframe.contentWindow.focus() Overflow
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1055.NASL
    descriptionMartijn Wargers and Nick Mott described crashes of Mozilla due to the use of a deleted controller context. In theory this could be abused to execute malicious code. Since Mozilla and Firefox share the same codebase, Firefox may be vulnerable as well.
    last seen2020-06-01
    modified2020-06-02
    plugin id22597
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22597
    titleDebian DSA-1055-1 : mozilla-firefox - programming error

Oval

accepted2009-11-09T04:00:11.490-05:00
classvulnerability
contributors
  • nameRobert L. Hollis
    organizationThreatGuard, Inc.
  • nameJonathan Baker
    organizationThe MITRE Corporation
  • nameJonathan Baker
    organizationThe MITRE Corporation
  • nameJonathan Baker
    organizationThe MITRE Corporation
  • nameJonathan Baker
    organizationThe MITRE Corporation
  • nameMike Lah
    organizationThe MITRE Corporation
descriptionMozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.
familywindows
idoval:org.mitre.oval:def:1790
statusaccepted
submitted2006-05-07T09:05:00.000-04:00
titleMozilla Deleted Object Reference When designMode="on"
version4