cve/2006/CVE-2006-1730.md

19 lines
855 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2006-1730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
### POC
#### Reference
- http://www.redhat.com/support/errata/RHSA-2006-0330.html
- http://www.securityfocus.com/archive/1/446658/100/200/threaded
#### Github
No PoCs found on GitHub currently.