← Back to CVEs
CVE-2006-3803
N/ADescription
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, and SeaMonkey before 1.0.3 might allow remote attackers to execute arbitrary code by causing the garbage collector to delete a temporary variable while it is still being used during the creation of a new Function object.
CVE Details
CVSS v3.1 ScoreN/A
Published7/27/2006
Last Modified4/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
mozilla:firefoxmozilla:seamonkeymozilla:thunderbird
References
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2006-0609.html(secalert@redhat.com)
http://secunia.com/advisories/19873(secalert@redhat.com)
http://secunia.com/advisories/21216(secalert@redhat.com)
http://secunia.com/advisories/21228(secalert@redhat.com)
http://secunia.com/advisories/21229(secalert@redhat.com)
http://secunia.com/advisories/21243(secalert@redhat.com)
http://secunia.com/advisories/21246(secalert@redhat.com)
http://secunia.com/advisories/21250(secalert@redhat.com)
http://secunia.com/advisories/21262(secalert@redhat.com)
http://secunia.com/advisories/21269(secalert@redhat.com)
http://secunia.com/advisories/21270(secalert@redhat.com)
http://secunia.com/advisories/21275(secalert@redhat.com)
http://secunia.com/advisories/21336(secalert@redhat.com)
http://secunia.com/advisories/21343(secalert@redhat.com)
http://secunia.com/advisories/21358(secalert@redhat.com)
http://secunia.com/advisories/21361(secalert@redhat.com)
http://secunia.com/advisories/21529(secalert@redhat.com)
http://secunia.com/advisories/21532(secalert@redhat.com)
http://secunia.com/advisories/21607(secalert@redhat.com)
http://secunia.com/advisories/21631(secalert@redhat.com)
http://secunia.com/advisories/22055(secalert@redhat.com)
http://secunia.com/advisories/22065(secalert@redhat.com)
http://secunia.com/advisories/22066(secalert@redhat.com)
http://secunia.com/advisories/22210(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200608-02.xml(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200608-04.xml(secalert@redhat.com)
http://securitytracker.com/id?1016586(secalert@redhat.com)
http://securitytracker.com/id?1016587(secalert@redhat.com)
http://securitytracker.com/id?1016588(secalert@redhat.com)
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml(secalert@redhat.com)
http://www.kb.cert.org/vuls/id/265964(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145(secalert@redhat.com)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146(secalert@redhat.com)
http://www.mozilla.org/security/announce/2006/mfsa2006-48.html(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0594.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0608.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0610.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0611.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/441333/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/446657/100/200/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/446658/100/200/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/19181(secalert@redhat.com)
http://www.ubuntu.com/usn/usn-350-1(secalert@redhat.com)
http://www.ubuntu.com/usn/usn-354-1(secalert@redhat.com)
http://www.us-cert.gov/cas/techalerts/TA06-208A.html(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/2998(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/3748(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/3749(secalert@redhat.com)
http://www.vupen.com/english/advisories/2008/0083(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27984(secalert@redhat.com)
https://issues.rpath.com/browse/RPL-536(secalert@redhat.com)
https://issues.rpath.com/browse/RPL-537(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635(secalert@redhat.com)
https://usn.ubuntu.com/327-1/(secalert@redhat.com)
https://usn.ubuntu.com/329-1/(secalert@redhat.com)
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0609.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19873(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21216(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21228(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21229(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21243(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21246(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21250(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21262(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21269(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21270(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21275(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21336(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21343(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21358(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21361(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21529(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21532(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21607(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21631(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22055(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22065(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22066(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22210(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200608-02.xml(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200608-04.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016586(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016587(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016588(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/265964(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2006:146(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2006/mfsa2006-48.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_48_seamonkey.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0594.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0608.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0610.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0611.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/441333/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/446657/100/200/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/446658/100/200/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/19181(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-350-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-354-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA06-208A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2998(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/3748(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/3749(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0083(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27984(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-536(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-537(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10635(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/327-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/329-1/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.