2017-10-16 12:31:07 -04:00
{
2019-03-17 23:02:45 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2006-1737" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 23:02:45 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "USN-275-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/275-1/"
} ,
{
"name" : "mozilla-javascript-regexpr-memory-corruption(25808)" ,
"refsource" : "XF" ,
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/25808"
} ,
{
"name" : "RHSA-2006:0330" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0330.html"
} ,
{
"name" : "SSRT061145" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
} ,
{
"name" : "19902" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19902"
} ,
{
"name" : "20060404-01-U" ,
"refsource" : "SGI" ,
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20060404-01-U.asc"
} ,
{
"name" : "USN-276-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/276-1/"
} ,
{
"name" : "HPSBUX02122" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
} ,
{
"name" : "19941" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19941"
} ,
{
"name" : "19780" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19780"
} ,
{
"name" : "RHSA-2006:0328" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0328.html"
} ,
{
"name" : "19821" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19821"
} ,
{
"name" : "GLSA-200604-12" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-12.xml"
} ,
{
"name" : "21622" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/21622"
} ,
{
"name" : "19862" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19862"
} ,
{
"name" : "MDKSA-2006:075" ,
"refsource" : "MANDRIVA" ,
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:075"
} ,
{
"name" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.avaya.com/elmodocs2/security/ASA-2006-205.htm"
} ,
{
"name" : "19823" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19823"
} ,
{
"name" : "DSA-1051" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2006/dsa-1051"
} ,
{
"name" : "FEDORA-2006-410" ,
"refsource" : "FEDORA" ,
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00153.html"
} ,
{
"name" : "USN-271-1" ,
"refsource" : "UBUNTU" ,
"url" : "https://usn.ubuntu.com/271-1/"
} ,
{
"name" : "19714" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19714"
} ,
{
"name" : "RHSA-2006:0329" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2006-0329.html"
} ,
{
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-11.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.mozilla.org/security/announce/2006/mfsa2006-11.html"
} ,
{
"name" : "GLSA-200604-18" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml"
} ,
{
"name" : "19811" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19811"
} ,
{
"name" : "HPSBTU02118" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/434524/100/0/threaded"
} ,
{
"name" : "19794" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19794"
} ,
{
"name" : "19746" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19746"
} ,
{
"name" : "21033" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/21033"
} ,
{
"name" : "102550" ,
"refsource" : "SUNALERT" ,
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102550-1"
} ,
{
"name" : "19696" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19696"
} ,
{
"name" : "19759" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19759"
} ,
{
"name" : "SUSE-SA:2006:021" ,
"refsource" : "SUSE" ,
"url" : "http://lists.suse.com/archive/suse-security-announce/2006-Apr/0003.html"
} ,
{
"name" : "FLSA:189137-2" ,
"refsource" : "FEDORA" ,
"url" : "http://www.securityfocus.com/archive/1/436338/100/0/threaded"
} ,
{
"name" : "ADV-2006-1356" ,
"refsource" : "VUPEN" ,
"url" : "http://www.vupen.com/english/advisories/2006/1356"
} ,
{
"name" : "SSRT061158" ,
"refsource" : "HP" ,
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
} ,
{
"name" : "oval:org.mitre.oval:def:10817" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10817"
} ,
{
"name" : "MDKSA-2006:078" ,
"refsource" : "MANDRIVA" ,
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:078"
} ,
{
"name" : "19729" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19729"
} ,
{
"name" : "20051" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/20051"
} ,
{
"name" : "19863" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19863"
} ,
{
"name" : "SCOSA-2006.26" ,
"refsource" : "SCO" ,
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.26/SCOSA-2006.26.txt"
} ,
{
"name" : "TA06-107A" ,
"refsource" : "CERT" ,
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-107A.html"
} ,
{
"name" : "FLSA:189137-1" ,
"refsource" : "FEDORA" ,
"url" : "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
} ,
{
"name" : "17516" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/17516"
} ,
{
"name" : "VU#329500" ,
"refsource" : "CERT-VN" ,
"url" : "http://www.kb.cert.org/vuls/id/329500"
} ,
{
"name" : "228526" ,
"refsource" : "SUNALERT" ,
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-228526-1"
} ,
{
"name" : "FEDORA-2006-411" ,
"refsource" : "FEDORA" ,
"url" : "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00154.html"
} ,
{
"name" : "19852" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19852"
} ,
{
"name" : "19721" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19721"
} ,
{
"name" : "SUSE-SA:2006:022" ,
"refsource" : "SUSE" ,
"url" : "http://www.novell.com/linux/security/advisories/2006_04_25.html"
} ,
{
"name" : "GLSA-200605-09" ,
"refsource" : "GENTOO" ,
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml"
} ,
{
"name" : "19631" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19631"
} ,
{
"name" : "oval:org.mitre.oval:def:1829" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1829"
} ,
{
"name" : "19950" ,
"refsource" : "SECUNIA" ,
"url" : "http://secunia.com/advisories/19950"
} ,
{
"name" : "MDKSA-2006:076" ,
"refsource" : "MANDRIVA" ,
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:076"
} ,
{
"name" : "DSA-1046" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2006/dsa-1046"
} ,
{
"name" : "DSA-1044" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2006/dsa-1044"
}
]
}
}