// For flags

CVE-2006-0749

Mozilla Firefox Tag Parsing Code Execution Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla/Firefox web browser and Thunderbird e-mail client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious e-mail.
The specific flaw exists within nsHTMLContentSink.cpp, during the parsing of HTML tags as they appear in a specific order. The flaw results in a memory corruption that leads to an attacker controlled function pointer dereference from the stack and eventually execution of arbitrary code.

*Credits: Anonymous
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-02-17 CVE Reserved
  • 2006-04-14 CVE Published
  • 2024-08-03 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
CAPEC
References (61)
URL Tag Source
http://secunia.com/advisories/19631 Third Party Advisory
http://secunia.com/advisories/19696 Third Party Advisory
http://secunia.com/advisories/19714 Third Party Advisory
http://secunia.com/advisories/19721 Third Party Advisory
http://secunia.com/advisories/19729 Third Party Advisory
http://secunia.com/advisories/19746 Third Party Advisory
http://secunia.com/advisories/19759 Third Party Advisory
http://secunia.com/advisories/19780 Third Party Advisory
http://secunia.com/advisories/19794 Third Party Advisory
http://secunia.com/advisories/19811 Third Party Advisory
http://secunia.com/advisories/19821 Third Party Advisory
http://secunia.com/advisories/19823 Third Party Advisory
http://secunia.com/advisories/19852 Third Party Advisory
http://secunia.com/advisories/19862 Third Party Advisory
http://secunia.com/advisories/19863 Third Party Advisory
http://secunia.com/advisories/19902 Third Party Advisory
http://secunia.com/advisories/19941 Third Party Advisory
http://secunia.com/advisories/19950 Third Party Advisory
http://secunia.com/advisories/20051 Third Party Advisory
http://secunia.com/advisories/21033 Third Party Advisory
http://secunia.com/advisories/21622 Third Party Advisory
http://securityreason.com/securityalert/729 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm Third Party Advisory
http://www.kb.cert.org/vuls/id/736934 Third Party Advisory
http://www.securityfocus.com/archive/1/431126/100/0/threaded Mailing List
http://www.securityfocus.com/bid/17516 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA06-107A.html Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-009.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/25819 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11704 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1848 Signature
URL Date SRC
URL Date SRC
URL Date SRC
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt 2018-10-19
ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc 2018-10-19
http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html 2018-10-19
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1 2018-10-19
http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1 2018-10-19
http://www.debian.org/security/2006/dsa-1044 2018-10-19
http://www.debian.org/security/2006/dsa-1046 2018-10-19
http://www.debian.org/security/2006/dsa-1051 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2006:075 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2006:076 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2006:078 2018-10-19
http://www.mozilla.org/security/announce/2006/mfsa2006-18.html 2018-10-19
http://www.novell.com/linux/security/advisories/2006_04_25.html 2018-10-19
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html 2018-10-19
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2006-0328.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2006-0329.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2006-0330.html 2018-10-19
http://www.securityfocus.com/archive/1/434524/100/0/threaded 2018-10-19
http://www.securityfocus.com/archive/1/436296/100/0/threaded 2018-10-19
http://www.securityfocus.com/archive/1/436338/100/0/threaded 2018-10-19
http://www.securityfocus.com/archive/1/438730/100/0/threaded 2018-10-19
https://usn.ubuntu.com/271-1 2018-10-19
https://usn.ubuntu.com/275-1 2018-10-19
https://usn.ubuntu.com/276-1 2018-10-19
https://access.redhat.com/security/cve/CVE-2006-0749 2006-04-21
https://bugzilla.redhat.com/show_bug.cgi?id=183537 2006-04-21
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
>= 1.0 <= 1.5
Search vendor "Mozilla" for product "Firefox" and version " >= 1.0 <= 1.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Mozilla Suite
Search vendor "Mozilla" for product "Mozilla Suite"
< 1.7.13
Search vendor "Mozilla" for product "Mozilla Suite" and version " < 1.7.13"
-
Affected
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
< 1.0
Search vendor "Mozilla" for product "Seamonkey" and version " < 1.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
>= 1.0 < 1.0.8
Search vendor "Mozilla" for product "Thunderbird" and version " >= 1.0 < 1.0.8"
-
Affected