Vulnerability Note VU#421529
Mozilla contains a buffer overflow vulnerability in crypto.signText()
Mozilla products contain a buffer overflow in the crypto.signText() method. This may allow a remote attacker to execute arbitrary code.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla, Inc.||Affected||-||02 Jun 2006|
CVSS Metrics (Learn More)
Thanks to the Mozilla Foundation Security Advisory for reporting this vulnerability, who in turn credit Mikolaj J. Habryn.
This document was written by Will Dormann.
- CVE IDs: CVE-2006-2778
- Date Public: 01 Jun 2006
- Date First Published: 02 Jun 2006
- Date Last Updated: 09 Feb 2007
- Severity Metric: 10.33
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.