CVE-2006-4253

N/A Unknown
Published: August 21, 2006 Modified: April 16, 2026
View on NVD

Description

Concurrency vulnerability in Mozilla Firefox 1.5.0.6 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via multiple Javascript timed events that load a deeply nested XML file, followed by redirecting the browser to another page, which leads to a concurrency failure that causes structures to be freed incorrectly, as demonstrated by (1) ffoxdie and (2) ffoxdie3. NOTE: it has been reported that Netscape 8.1 and K-Meleon 1.0.1 are also affected by ffoxdie. Mozilla confirmed to CVE that ffoxdie and ffoxdie3 trigger the same underlying vulnerability. NOTE: it was later reported that Firefox 2.0 RC2 and 1.5.0.7 are also affected.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21513
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21906
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21915
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21916
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21939
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21940
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21949
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21950
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22001
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22025
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22036
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22055
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22074
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22088
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22210
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22274
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22391
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/22422
Source: cve@mitre.org
Vendor Advisory
http://www.pianetapc.it/view.php?id=770
Source: cve@mitre.org
URL Repurposed
http://lcamtuf.coredump.cx/ffoxdie.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://lcamtuf.coredump.cx/ffoxdie3.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21513
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21906
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21915
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21916
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21939
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21940
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21949
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21950
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22001
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22025
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22036
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22055
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22056
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22074
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22088
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22195
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22274
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22391
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22422
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24711
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200609-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200610-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200610-04.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016846
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016847
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016848
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-59.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.pianetapc.it/view.php?id=770
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.redhat.com/support/errata/RHSA-2006-0675.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0676.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0677.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securiteam.com/securitynews/5VP0M0AJFW.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443020/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443306/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443500/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/443528/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/446140/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447837/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/447840/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/448956/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/448984/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/449245/100/100/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/449487/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/449726/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19488
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19534
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-350-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-351-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-352-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-354-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3617
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1198
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=348514
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-640
Source: af854a3a-2127-422b-91ae-364da2661108

134 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
30.8%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

k-meleon_project mozilla netscape