Vulnerabilities > CVE-2006-5159 - Unspecified vulnerability in Mozilla Firefox
Summary
Stack-based buffer overflow in Mozilla Firefox allows remote attackers to execute arbitrary code via unspecified vectors involving JavaScript. NOTE: the vendor and original researchers have released a follow-up comment disputing the severity of this issue, in which the researcher states that "we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this... I have not succeeded in making this code do anything more than cause a crash and eat up system resources"
Vulnerable Configurations
Statements
contributor | Joshua Bressers |
lastmodified | 2006-10-16 |
organization | Red Hat |
statement | Red Hat does not consider this issue to be a security vulnerability. We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat. In the event more information becomes available, we will revisit this issue in the future. |
References
- http://developer.mozilla.org/devnews/index.php/2006/10/02/update-possible-vulnerability-reported-at-toorcon/
- http://www.securitypronews.com/insiderreports/insider/spn-49-20061003FirefoxVulnerabilityClaimWasAJoke.html
- http://www.securityfocus.com/bid/20282
- http://www.securityfocus.com/bid/20294
- http://securitytracker.com/id?1016962
- http://securityreason.com/securityalert/1678
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29317
- http://www.securityfocus.com/archive/1/447497/100/0/threaded
- http://www.securityfocus.com/archive/1/447493/100/0/threaded