search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mozilla products fail to properly handle frame references

Vulnerability Note VU#476724

Original Release Date: 2006-07-27 | Last Revised: 2007-02-09


Mozilla products fail to properly handle frame or window references. This may allow a remote attacker to execute arbitrary code on a vulnerable system.


JavaScript references are not properly cleared after an object is deleted. An attacker may be able to use the reference to a deleted object to execute arbitrary code on a vulnerable system.

According to the Mozilla Foundation Security Advisory 2006-044, versions of Mozilla Firefox prior to 1.5 and the Mozilla Suite are not affected by this vulnerability.


A remote, unauthenticated attacker could execute code with the privileges of the user running the Mozilla-based web browser.


Apply an update
This vulnerability is addressed in Firefox, Thunderbird, and SeaMonkey 1.0.3, according to the Mozilla Foundation Security Update MFSA 2006-44.

Disable JavaScript

This vulnerability can be mitigated by disabling JavaScript.

Vendor Information


Mozilla, Inc. Affected

Updated:  July 27, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


Please see Mozilla Foundation Security Advisory 2006-44.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



This vulnerability was reported by the Mozilla Foundation, who in turn credit Thilo Germann.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-3801
Severity Metric: 8.35
Date Public: 2006-07-25
Date First Published: 2006-07-27
Date Last Updated: 2007-02-09 14:03 UTC
Document Revision: 18

Sponsored by CISA.