{"vuid":"VU#252324","idnumber":"252324","name":"Mozilla display style vulnerability","keywords":["Mozilla","DoS","denial of service","-moz-grid","msfa2006-11"],"overview":"Mozilla products contain an unspecified vulnerability in the way they handle display styles. This vulnerability may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"Mozilla products contain an unspecified vulnerability in the way they handle the -moz-grid and -moz-grid-group display styles. If a remote attacker can persuade a user to access a specially crafted web page, that attacker may be able to cause the attacked Mozilla product to crash in a way that could allow them to execute arbitrary code. For more information please refer to Mozilla Foundation Security Advisory 2006-11.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause the attacked Mozilla product to crash.","resolution":"Upgrade\nRefer to Mozilla Foundation Security Advisory 2006-11 for fixed versions of Mozilla products.","workarounds":"Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.","sysaffected":"","thanks":"This vulnerability was reported in Mozilla Foundation Security Advisory \n2006-11\n. Mozilla credits \nAlden D'Souza \nwith providing information regarding this issue.","author":"This document was written by Jeff Gennari","public":["h","t","t","p",":","/","/","w","w","w",".","m","o","z","i","l","l","a",".","o","r","g","/","s","e","c","u","r","i","t","y","/","a","n","n","o","u","n","c","e","/","2","0","0","6","/","m","f","s","a","2","0","0","6","-","1","1",".","h","t","m","l"],"cveids":["CVE-2006-1738"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-14T14:35:07Z","publicdate":"2006-04-11T00:00:00Z","datefirstpublished":"2006-04-17T17:03:55Z","dateupdated":"2006-04-17T17:04:03Z","revision":20,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"18","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"17","cam_scorecurrent":"17.55675","cam_scorecurrentwidelyknown":"22.433625","cam_scorecurrentwidelyknownexploited":"41.941125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.55675,"vulnote":null}