CVE-2006-3677

N/A Unknown
Published: July 27, 2006 Modified: April 16, 2026
View on NVD

Description

Mozilla Firefox 1.5 before 1.5.0.5 and SeaMonkey before 1.0.3 allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object (window.navigator) that are accessed when Java starts up, which causes a crash that leads to code execution.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2006-0609.html
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/19873
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/21216
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/21229
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/21243
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21246
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21262
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21269
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21270
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21336
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21343
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21361
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21529
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21532
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21631
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22066
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22210
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/670060
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/19192
Source: cve@mitre.org
Patch
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2006/2998
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3748
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: cve@mitre.org
Vendor Advisory
https://usn.ubuntu.com/327-1/
Source: cve@mitre.org
http://rhn.redhat.com/errata/RHSA-2006-0609.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/19873
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21216
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21229
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21243
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21246
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21262
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21269
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21270
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21336
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21343
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21361
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21529
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21532
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21631
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200608-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016586
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016587
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200608-03.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/670060
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:143
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:145
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-45.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0594.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0608.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0610.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0611.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/441332/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441333/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446658/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19181
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19192
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.ubuntu.com/usn/usn-354-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA06-208A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2006/2998
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/27981
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/39998
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-536
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/327-1/
Source: af854a3a-2127-422b-91ae-364da2661108

94 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
67.3%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla