// For flags

CVE-2006-2781

(seamonkey): DOS/arbitrary code execution vuln with vcards

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Double free vulnerability in nsVCard.cpp in Mozilla Thunderbird before 1.5.0.4 and SeaMonkey before 1.0.2 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a VCard that contains invalid base64 characters.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-06-02 CVE Reserved
  • 2006-06-02 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (36)
URL Date SRC
URL Date SRC
URL Date SRC
http://rhn.redhat.com/errata/RHSA-2006-0609.html 2018-10-18
http://secunia.com/advisories/20382 2018-10-18
http://secunia.com/advisories/20394 2018-10-18
http://secunia.com/advisories/20709 2018-10-18
http://secunia.com/advisories/21134 2018-10-18
http://secunia.com/advisories/21178 2018-10-18
http://secunia.com/advisories/21183 2018-10-18
http://secunia.com/advisories/21210 2018-10-18
http://secunia.com/advisories/21269 2018-10-18
http://secunia.com/advisories/21324 2018-10-18
http://secunia.com/advisories/21336 2018-10-18
http://secunia.com/advisories/21607 2018-10-18
http://secunia.com/advisories/21631 2018-10-18
http://secunia.com/advisories/22065 2018-10-18
http://www.debian.org/security/2006/dsa-1118 2018-10-18
http://www.debian.org/security/2006/dsa-1134 2018-10-18
http://www.gentoo.org/security/en/glsa/glsa-200606-21.xml 2018-10-18
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146 2018-10-18
http://www.novell.com/linux/security/advisories/2006_35_mozilla.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0578.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0594.html 2018-10-18
http://www.redhat.com/support/errata/RHSA-2006-0611.html 2018-10-18
http://www.securityfocus.com/archive/1/446657/100/200/threaded 2018-10-18
https://usn.ubuntu.com/297-1 2018-10-18
https://usn.ubuntu.com/297-3 2018-10-18
https://usn.ubuntu.com/323-1 2018-10-18
https://access.redhat.com/security/cve/CVE-2006-2781 2006-07-29
https://bugzilla.redhat.com/show_bug.cgi?id=193963 2006-07-29
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Seamonkey
Search vendor "Mozilla" for product "Seamonkey"
<= 1.0.1
Search vendor "Mozilla" for product "Seamonkey" and version " <= 1.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 1.5.0.3
Search vendor "Mozilla" for product "Thunderbird" and version " <= 1.5.0.3"
-
Affected