// For flags

CVE-2006-4567

 

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Mozilla Firefox before 1.5.0.7 and Thunderbird before 1.5.0.7 makes it easy for users to accept self-signed certificates for the auto-update mechanism, which might allow remote user-assisted attackers to use DNS spoofing to trick users into visiting a malicious site and accepting a malicious certificate for the Mozilla update site, which can then be used to install arbitrary code on the next update.

Mozilla Firefox anterior a 1.5.0.7 y Thunderbird anteror a 1.5.0.7 hacen que fuera facil que los usuarios aceptaran certificados auto-firmados para el mecanismo de auto-actualización, el cual pudo permitir a atacantes con la complicidad del usuario usando suplantación DNS engañando a los usuarios con la visita a un sitio malicioso y aceptando un certificado malicioso para la actualización de Mozilla, el cual puede ser usado para instalar codido de elección del atacante en la siguiente actualización.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-09-06 CVE Reserved
  • 2006-09-15 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (42)
URL Tag Source
http://secunia.com/advisories/21916 Third Party Advisory
http://secunia.com/advisories/21939 Third Party Advisory
http://secunia.com/advisories/21950 Third Party Advisory
http://secunia.com/advisories/22001 Third Party Advisory
http://secunia.com/advisories/22025 Third Party Advisory
http://secunia.com/advisories/22055 Third Party Advisory
http://secunia.com/advisories/22056 Third Party Advisory
http://secunia.com/advisories/22066 Third Party Advisory
http://secunia.com/advisories/22074 Third Party Advisory
http://secunia.com/advisories/22088 Third Party Advisory
http://secunia.com/advisories/22195 Third Party Advisory
http://secunia.com/advisories/22210 Third Party Advisory
http://secunia.com/advisories/22274 Third Party Advisory
http://secunia.com/advisories/22422 Third Party Advisory
http://securitytracker.com/id?1016850 Vdb Entry
http://securitytracker.com/id?1016851 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm X_refsource_confirm
http://www.securityfocus.com/archive/1/446140/100/0/threaded Mailing List
http://www.securityfocus.com/bid/20042 Vdb Entry
http://www.vupen.com/english/advisories/2006/3617 Vdb Entry
http://www.vupen.com/english/advisories/2006/3748 Vdb Entry
http://www.vupen.com/english/advisories/2008/0083 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/28950 Vdb Entry
https://issues.rpath.com/browse/RPL-640 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10488 Signature
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 1.5.0.6
Search vendor "Mozilla" for product "Firefox" and version " <= 1.5.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 1.5.0.6
Search vendor "Mozilla" for product "Thunderbird" and version " <= 1.5.0.6"
-
Affected