{"vuid":"VU#476724","idnumber":"476724","name":"Mozilla products fail to properly handle frame references","keywords":["Mozilla","Firefox","code execution","JavaScript reference","frame","window","firefox_1505"],"overview":"Mozilla products fail to properly handle frame or window references. This may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"JavaScript references are not properly cleared after an object is deleted. An attacker may be able to use the reference to a deleted object to execute arbitrary code on a vulnerable system. According to the Mozilla Foundation Security Advisory 2006-044, versions of Mozilla Firefox prior to 1.5 and the Mozilla Suite are not affected by this vulnerability.","impact":"A remote, unauthenticated attacker could execute code with the privileges of the user running the Mozilla-based web browser.","resolution":"Apply an update\nThis vulnerability is addressed in Firefox 1.5.0.5, Thunderbird 1.5.0.5, and SeaMonkey 1.0.3, according to the Mozilla Foundation Security Update MFSA 2006-44.","workarounds":"Disable JavaScript This vulnerability can be mitigated by disabling JavaScript.","sysaffected":"","thanks":"This vulnerability was reported by the Mozilla Foundation, who in turn credit Thilo Germann.","author":"This document was written by Ryan Giobbi.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-44.html","https://bugzilla.mozilla.org/show_bug.cgi?id=338288","http://secunia.com/advisories/19873/","http://secunia.com/advisories/21216/","http://secunia.com/advisories/21229/","http://secunia.com/advisories/21228/","http://www.securityfocus.com/bid/19181"],"cveids":["CVE-2006-3801"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-07-27T14:11:06Z","publicdate":"2006-07-25T00:00:00Z","datefirstpublished":"2006-07-27T17:39:30Z","dateupdated":"2007-02-09T14:03:58Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"1","cam_internetinfrastructure":"9","cam_population":"11","cam_impact":"15","cam_easeofexploitation":"6","cam_attackeraccessrequired":"18","cam_scorecurrent":"8.353125","cam_scorecurrentwidelyknown":"10.02375","cam_scorecurrentwidelyknownexploited":"16.372125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.353125,"vulnote":null}