Mozilla Foundation Security Advisory 2006-24
Privilege escalation using crypto.generateCRMFRequest
- Announced
- April 13, 2006
- Reporter
- shutdown
- Impact
- Critical
- Products
- Firefox, Mozilla Suite, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 1.0.8
- Firefox 1.5.0.2
- Mozilla Suite 1.7.13
- SeaMonkey 1.0.1
- Thunderbird 1.0.8
- Thunderbird 1.5.0.2
Description
shutdown demonstrated that the crypto.generateCRMFRequest method can be used to run arbitrary code with the privilege of the user, which could enable an attacker to install malware.
Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.
Workaround
Disable JavaScript until you can upgrade to a version with the fix.
References
Exploit code and details embargoed during the active update period.
-
https://bugzilla.mozilla.org/show_bug.cgi?id=327126
CVE-2006-1728