{"vuid":"VU#421529","idnumber":"421529","name":"Mozilla contains a buffer overflow vulnerability in crypto.signText()","keywords":["Mozilla","Firefox","Thunderbird","crypto.signText","buffer overflow","firefox_1504"],"overview":"Mozilla products contain a buffer overflow in the crypto.signText() method. This may allow a remote attacker to execute arbitrary code.","clean_desc":"crypto.SignText() JavaScript contains a crypto.signText() method, which allows the user to digitally sign a text string. The problem The Mozilla crypto.signText() method contains a buffer overflow. Mozilla Firefox and Thunderbird are reported to be vulnerable.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Apply an update\nRefer to Mozilla Foundation Security Advisory 2006-38 for fixed versions of Mozilla products.","workarounds":"Disable JavaScript This vulnerability can be mitigated by disabling JavaScript.","sysaffected":"","thanks":"Thanks to the Mozilla Foundation Security Advisory for reporting this vulnerability, who in turn credit Mikolaj J. Habryn.","author":"This document was written by Will Dormann.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-38.html","https://bugzilla.mozilla.org/show_bug.cgi?id=330897","http://devedge-temp.mozilla.org/library/manuals/2000/javascript/1.3/reference/window.html#1202035","http://secunia.com/advisories/21188/","http://www.securityfocus.com/bid/18228"],"cveids":["CVE-2006-2778"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-06-02T13:00:02Z","publicdate":"2006-06-01T00:00:00Z","datefirstpublished":"2006-06-02T15:02:51Z","dateupdated":"2007-02-09T14:34:59Z","revision":17,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"12","cam_impact":"15","cam_easeofexploitation":"9","cam_attackeraccessrequired":"17","cam_scorecurrent":"10.3275","cam_scorecurrentwidelyknown":"15.49125","cam_scorecurrentwidelyknownexploited":"25.81875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.3275,"vulnote":null}