{"vuid":"VU#866300","idnumber":"866300","name":"Mozilla Firefox designMode deleted object reference","keywords":["Mozilla","Firefox","iframe.contentWindow.focus()","DoS","denial of service","Javascript","js320.dll","xpcom_core.dll"],"overview":"Mozilla Firefox contains a deleted object reference vulnerability. This may allow a remote attacker to execute arbitrary code.","clean_desc":"Mozilla Firefox contains a vulnerability that causes a deleted object to be referenced when designMode is set to \"on.\"  When Firefox attempts to use this deleted object, the browser can crash. It may be possible to execute arbitrary code by using references to deleted objects.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running Firefox.","resolution":"Apply an update\nUpdate to Firefox 1.5.0.3, as specified in Mozilla Foundation Security Advisory 2006-30.","workarounds":"Disable scripting This vulnerability can be mitigated by disabling JavaScript.","sysaffected":"","thanks":"This vulnerability was publicly disclosed by splices. Mozilla also credits Martijn Wargers and Nick Mott.","author":"This document was written by Will Dormann.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-30.html","https://bugzilla.mozilla.org/show_bug.cgi?id=334515","http://www.securident.com/vuln/ff.txt","http://secunia.com/advisories/19802/","http://www.securityfocus.com/bid/17671","http://securitytracker.com/id?1015981"],"cveids":["CVE-2006-1993"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-26T15:14:06Z","publicdate":"2006-04-24T00:00:00Z","datefirstpublished":"2006-05-02T19:51:20Z","dateupdated":"2006-05-18T19:47:29Z","revision":19,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"12","cam_impact":"10","cam_easeofexploitation":"7","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.875","cam_scorecurrentwidelyknown":"9.45","cam_scorecurrentwidelyknownexploited":"15.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.875,"vulnote":null}