{"vuid":"VU#141528","idnumber":"141528","name":"Mozilla products fail to properly handle JavaScript regular expressions","keywords":["Mozilla","Firefox","Thunderbird","SeaMonkey","JavaScript","regular expressions","minimal quantifier"],"overview":"Mozilla products fail to properly handle certain JavaScript regular expressions. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"According to Mozilla Foundation Security Advisory 2006-57: ...a regular expression that ends with a backslash inside an unterminated character set (e.g. \"[\\\\\") will cause the regular epression engine to read beyond the end of the buffer, possibly leading to a crash. JavaScript must be enabled in order for this vulnerability to be exposed. JavaScript is enabled by default in the Firefox web browser, but not in the Mozilla Thunderbird email client. This vulnerability could be exploited in an affected web browser by viewing a specially crafted web page, or in an affected email client by viewing a specially crafted email message. Note that this issue affects Mozilla Firefox, Thunderbird, and SeaMonkey.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.","resolution":"Upgrade\nThis issue is addressed by Firefox 1.5.0.7, Thunderbird 1.5.0.7, and SeaMonkey 1.0.5.","workarounds":"Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.","sysaffected":"","thanks":"This issue was reported in Mozilla Foundation Security Advisory \n2006-57\n. Mozilla credits Priit Laes, CanadianGuy, Girts Folkmanis, and Catalin Patulea for reporting this issue.","author":"This document was written by Chris Taschner.","public":["http://secunia.com/advisories/21906/","http://www.mozilla.org/security/announce/2006/mfsa2006-57.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-15T20:23:10Z","publicdate":"2006-09-15T00:00:00Z","datefirstpublished":"2006-09-20T13:35:53Z","dateupdated":"2006-10-02T13:53:13Z","revision":26,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"27","cam_scorecurrentwidelyknown":"33.75","cam_scorecurrentwidelyknownexploited":"60.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":27.0,"vulnote":null}