CVE-2006-1726
CVSS9.3
发布时间 :2006-04-14 06:02:00
修订时间 :2011-03-07 21:33:44
NMCO    

[原文]Unspecified vulnerability in Firefox and Thunderbird 1.5 before 1.5.0.2, and SeaMonkey before 1.0.1, allows remote attackers to bypass the js_ValueToFunctionObject check and execute arbitrary code via unknown vectors involving setTimeout and Firefox' ForEach method.


[CNNVD]Mozilla Firefox/Thunderbird 权限提升漏洞(CNNVD-200604-232)

        Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        未指定的漏洞在Firefox和Thunderbird 1.5.0.2之前1.5,之前1.0.1组件,攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。

- CVSS (基础分值)

CVSS分值: 9.3 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)

cpe:/a:mozilla:firefox:1.5:beta1Mozilla Firefox 1.5 Beta 1
cpe:/a:mozilla:firefox:1.5.0.1Mozilla Firefox 1.5.0.1
cpe:/a:mozilla:thunderbird:1.0.7Mozilla Thunderbird 1.0.7
cpe:/a:mozilla:firefox:1.0.5Mozilla Firefox 1.0.5
cpe:/a:mozilla:firefox:1.0.4Mozilla Firefox 1.0.4
cpe:/a:mozilla:thunderbird:1.5:beta2Mozilla Thunderbird 1.5 Beta 2
cpe:/a:mozilla:firefox:1.0.6Mozilla Firefox 1.0.6
cpe:/a:mozilla:firefox:1.0.7Mozilla Firefox 1.0.7
cpe:/a:mozilla:firefox:preview_release
cpe:/a:mozilla:thunderbird:1.0Mozilla Thunderbird 1.0
cpe:/a:mozilla:seamonkey:1.0::alpha
cpe:/a:mozilla:firefox:1.0.3Mozilla Firefox 1.0.3
cpe:/a:mozilla:thunderbird:1.0.4Mozilla Thunderbird 1.0.4
cpe:/a:mozilla:thunderbird:1.5Mozilla Thunderbird 1.5
cpe:/a:mozilla:firefox:1.0.1Mozilla Firefox 1.0.1
cpe:/a:mozilla:seamonkey:1.0:betaMozilla SeaMonkey 1.0 beta
cpe:/a:mozilla:thunderbird:1.0.5:betaMozilla Thunderbird 1.0.5 Beta
cpe:/a:mozilla:firefox:1.0.2Mozilla Firefox 1.0.2
cpe:/a:mozilla:firefox:1.5Mozilla Firefox 1.5
cpe:/a:mozilla:thunderbird:1.0.5Mozilla Thunderbird 1.0.5
cpe:/a:mozilla:thunderbird:1.0.1Mozilla Thunderbird 1.0.1
cpe:/a:mozilla:firefox:1.0Mozilla Firefox 1.0
cpe:/a:mozilla:firefox:1.5:beta2Mozilla Firefox 1.5 Beta 2
cpe:/a:mozilla:thunderbird:1.0.3Mozilla Thunderbird 1.0.3
cpe:/a:mozilla:thunderbird:1.0.2Mozilla Thunderbird 1.0.2
cpe:/a:mozilla:thunderbird:1.0.6Mozilla Thunderbird 1.0.6

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1968Mozilla Security Check of js_ValueToFunctionObject() Can Be Circumvented
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1726
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1726
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-232
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA06-107A.html
(UNKNOWN)  CERT  TA06-107A
http://www.kb.cert.org/vuls/id/968814
(UNKNOWN)  CERT-VN  VU#968814
http://www.mozilla.org/security/announce/2006/mfsa2006-28.html
(VENDOR_ADVISORY)  CONFIRM  http://www.mozilla.org/security/announce/2006/mfsa2006-28.html
http://xforce.iss.net/xforce/xfdb/25825
(UNKNOWN)  XF  mozilla-valuetofunctionobject-sec-bypass(25825)
http://www.vupen.com/english/advisories/2008/0083
(UNKNOWN)  VUPEN  ADV-2008-0083
http://www.vupen.com/english/advisories/2006/3749
(UNKNOWN)  VUPEN  ADV-2006-3749
http://www.vupen.com/english/advisories/2006/3748
(UNKNOWN)  VUPEN  ADV-2006-3748
http://www.vupen.com/english/advisories/2006/1356
(UNKNOWN)  VUPEN  ADV-2006-1356
http://www.securityfocus.com/bid/17516
(UNKNOWN)  BID  17516
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  SSRT061181
http://www.securityfocus.com/archive/1/archive/1/446658/100/200/threaded
(UNKNOWN)  HP  HPSBUX02153
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  SSRT061236
http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded
(UNKNOWN)  HP  SSRT061236
http://www.securityfocus.com/archive/1/archive/1/434524/100/0/threaded
(UNKNOWN)  HP  SSRT061145
http://www.securityfocus.com/archive/1/archive/1/434524/100/0/threaded
(UNKNOWN)  HP  HPSBTU02118
http://securitytracker.com/id?1015933
(UNKNOWN)  SECTRACK  1015933
http://securitytracker.com/id?1015932
(UNKNOWN)  SECTRACK  1015932
http://securitytracker.com/id?1015931
(UNKNOWN)  SECTRACK  1015931
http://secunia.com/advisories/22066
(VENDOR_ADVISORY)  SECUNIA  22066
http://secunia.com/advisories/22065
(VENDOR_ADVISORY)  SECUNIA  22065
http://secunia.com/advisories/19649
(VENDOR_ADVISORY)  SECUNIA  19649
http://secunia.com/advisories/19631
(VENDOR_ADVISORY)  SECUNIA  19631

- 漏洞信息

Mozilla Firefox/Thunderbird 权限提升漏洞
高危 资料不足
2006-04-14 00:00:00 2006-04-15 00:00:00
远程  
        Mozilla Suite/Firefox/SeaMonkey/Thunderbird都是Mozilla发布的WEB浏览器和邮件新闻组客户端产品。
        未指定的漏洞在Firefox和Thunderbird 1.5.0.2之前1.5,之前1.0.1组件,攻击者可以利用setTimeout()和新的Firefox 1.5数组方式ForEach绕过js_ValueToFunctionObject()中的安全检查,获得权限提升。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Sun Solaris 10.0
        Sun 119115-21
        http://sunsolve.sun.com/
        Sun Solaris 8
        Sun 120671-03
        http://sunsolve.sun.com/patches/
        HP HP-UX B.11.23
        HP Firefox v2.0.0.4
        http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html
        HP thunderbird_1.5.0.9_ia.depot.gz
        For HP-UX B.11.23 and B.11.31 (IA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        HP thunderbird_1.5.0.9_pa.depot.gz
        For HP-UX B.11.11, B.11.23, and B.11.31 (PA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        HP HP-UX B.11.11
        HP Firefox v2.0.0.4
        http://www.hp.com/products1/unix/java/firefox/downloads/license_firefo x_2-0-0-4.html
        HP thunderbird_1.5.0.9_pa.depot.gz
        For HP-UX B.11.11, B.11.23, and B.11.31 (PA)
        http://www.hp.com/products1/unix/java/firefox/downloads/license_thunde rbird_1-5-0-8.html
        Mozilla Thunderbird 0.8
        Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.i386.rpm
        Fedora Core 3:
        http://download.fedoralegacy.org/fedora/3/updates/i386/thunderbird-1.0 .8-1.1.fc3.4.legacy.i386.rpm
        Fedora Legacy thunderbird-1.0.8-1.1.fc3.4.legacy.x86_64.rpm
        Fedora Core 3:
        http://download.fedoralegacy.org/fedora/3/updates/x86_64/thunderbird-1 .0.8-1.1.fc3.4.legacy.x86_64.rpm
        Mozilla Firefox 1.0.4
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_alpha.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_amd64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_amd64.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_arm.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_arm.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_hppa.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_hppa.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_i386.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_i386.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_ia64.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_ia64.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_m68k.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_m68k.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mips.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mips.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_mipsel.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_powerpc.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_s390.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_s390.deb
        Debian mozilla-firefox-dom-inspector_1.0.4-2sarge6_sparc.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-dom-inspector_1.0.4-2sarge6_sparc.deb
        Debian mozilla-firefox-gnome-support_1.0.4-2sarge6_alpha.deb
        Debian GNU/Linux 3.1 alias sarge
        http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla -firefox-gnome-support_1.

- 漏洞信息

24682
Mozilla Multiple Products js_ValueToFunctionObject() Security Check Bypass
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-04-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站