{"vuid":"VU#265964","idnumber":"265964","name":"Mozilla products contain a race condition","keywords":["Mozilla","Firefox","code execution","JavaScript garbage collection","temporary variable","creation of a new Function object","firefox_1505","MFSA 2006-048","Mozilla Foundation Security Advisory 2006-48"],"overview":"Mozilla products contain a race condition. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The Mozilla products JavaScript garbage collection process may delete a variable while that variable is still in use. This may corrupt memory in a way that can allow an attacker to execute arbitrary code. For complete list of affected products refer to Mozilla Foundation Security Advisory 2006-48.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. The attacker could also cause the vulnerable application to crash.","resolution":"Apply an update \nThis vulnerability is addressed in Firefox 1.5.0.5, Thunderbird 1.5.0.5, and SeaMonkey 1.0.3, according to the Mozilla Foundation Security Update 2006-48.","workarounds":"Disable JavaScript This vulnerability can be mitigated by disabling JavaScript.","sysaffected":"","thanks":"This vulnerability was reported in Mozilla Foundation Security Advisory \n2006-48\n. Mozilla credits \nH. D. Moore with reporting this vulnerability.","author":"This document was written by Jeff Gennari.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-48.html","https://bugzilla.mozilla.org/show_bug.cgi?id=344759","https://bugzilla.mozilla.org/show_bug.cgi?id=344960","http://secunia.com/advisories/19873/","http://secunia.com/advisories/21216/","http://www.securityfocus.com/bid/19181"],"cveids":["CVE-2006-3803"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-07-27T14:15:17Z","publicdate":"2006-07-25T00:00:00Z","datefirstpublished":"2006-07-27T15:12:33Z","dateupdated":"2007-02-09T14:05:05Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"5","cam_attackeraccessrequired":"20","cam_scorecurrent":"16.03125","cam_scorecurrentwidelyknown":"18.703125","cam_scorecurrentwidelyknownexploited":"29.390625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":16.03125,"vulnote":null}