CVE-2006-4568

CVSS V2 Medium 4.3 CVSS V3 None
Description
Mozilla Firefox before 1.5.0.7 and SeaMonkey before 1.0.5 allows remote attackers to bypass the security model and inject content into the sub-frame of another site via targetWindow.frames[n].document.open(), which facilitates spoofing and other attacks.
Overview
  • CVE ID
  • CVE-2006-4568
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2006-09-15T19:07:00
  • Last Modified Date
  • 2018-10-17T21:37:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 1.5.0.6
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.0.4
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://www.mozilla.org/security/announce/2006/mfsa2006-61.html Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0676.html Patch Vendor Advisory
http://secunia.com/advisories/21906 Patch Vendor Advisory
http://secunia.com/advisories/21949 Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0675.html
http://www.securityfocus.com/bid/20042
http://securitytracker.com/id?1016855
http://securitytracker.com/id?1016856
http://secunia.com/advisories/21915
http://secunia.com/advisories/21940
http://secunia.com/advisories/21950
ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc
http://secunia.com/advisories/22036
http://secunia.com/advisories/22001
http://security.gentoo.org/glsa/glsa-200609-19.xml
http://www.novell.com/linux/security/advisories/2006_54_mozilla.html
http://www.ubuntu.com/usn/usn-351-1
http://www.ubuntu.com/usn/usn-354-1
http://secunia.com/advisories/22025
http://www.us.debian.org/security/2006/dsa-1191
http://secunia.com/advisories/22210
http://secunia.com/advisories/22247
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
http://www.debian.org/security/2006/dsa-1192
http://security.gentoo.org/glsa/glsa-200610-04.xml
http://www.ubuntu.com/usn/usn-361-1
http://secunia.com/advisories/22299
http://secunia.com/advisories/22342
http://secunia.com/advisories/22391
http://secunia.com/advisories/22422
http://www.debian.org/security/2006/dsa-1210
http://secunia.com/advisories/22849
http://secunia.com/advisories/22056
http://secunia.com/advisories/22195
https://issues.rpath.com/browse/RPL-640
http://secunia.com/advisories/24711
https://bugzilla.mozilla.org/show_bug.cgi?id=343168
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
http://secunia.com/advisories/22066
http://www.vupen.com/english/advisories/2008/0083
http://www.vupen.com/english/advisories/2006/3617
http://www.vupen.com/english/advisories/2006/3748
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
http://www.vupen.com/english/advisories/2007/1198
https://exchange.xforce.ibmcloud.com/vulnerabilities/28961
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9843
http://www.securityfocus.com/archive/1/446140/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:13:07 Added to TrackCVE