Heap-based buffer overflow in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2006-12-20 01:28
Updated : 2024-02-04 17:13
NVD link : CVE-2006-6500
Mitre link : CVE-2006-6500
CVE.ORG link : CVE-2006-6500
JSON object : View
Products Affected
debian
- debian_linux
mozilla
- seamonkey
- thunderbird
- firefox
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer