Vulnerability Note VU#606260

Mozilla Layout Engine vulnerability

Original Release date: 20 Dec 2006 | Last revised: 07 Feb 2007


A vulnerability exists in the Mozilla Layout Engine that may allow a remote attacker to compromise a vulnerable system.


The Mozilla Layout Engine contains an unspecified vulnerability that may result in memory corruption. The impact of this memory corruption is unclear. According to Mozilla Foundation Security Advisory 2006-68:

    Some of these were crashes that showed evidence of memory corruption and we presume that at least some of these could be exploited to run arbitrary code with enough effort.


The specific consequences of this vulnerability are not clear, but may include execution of arbitrary code and denial of service.


Apply an update
According to the Mozilla Foundation Security Update 2006-68, this vulnerability is addressed in Firefox, Firefox, Thunderbird, and SeaMonkey 1.0.7.

Disable JavaScript

For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Fedora ProjectAffected-18 Jan 2007
Gentoo LinuxAffected-18 Jan 2007
Mandriva, Inc.Affected-18 Jan 2007
MozillaAffected-20 Dec 2006
Red Hat, Inc.Affected-18 Jan 2007
rPathAffected-18 Jan 2007
Slackware Linux Inc.Affected-18 Jan 2007
SUSE LinuxAffected-18 Jan 2007
UbuntuAffected-18 Jan 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported in Mozilla Foundation Security Advisory 2006-68. Mozilla credits Andrew Miller, David Baron, Georgi Guninski, Jesse Ruderman, Olli Pettay and Vladimir Vukicevic with providing information about this issue.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2006-6497
  • Date Public: 19 Dec 2006
  • Date First Published: 20 Dec 2006
  • Date Last Updated: 07 Feb 2007
  • Severity Metric: 4.13
  • Document Revision: 29


If you have feedback, comments, or additional information about this vulnerability, please send us email.