Heap-based buffer overflow in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap.
2006-12-20T01:28:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | firefox | < 1.5.0.9 | Yes |
Application | mozilla | firefox | < 2.0.0.1 | Yes |
Application | mozilla | seamonkey | < 1.0.7 | Yes |
Application | mozilla | thunderbird | < 1.5.0.9 | Yes |
Operating System | debian | debian_linux | 3.1 | Yes |
Operating System | debian | debian_linux | 4.0 | Yes |
Operating System | canonical | ubuntu_linux | 5.10 | Yes |
Operating System | canonical | ubuntu_linux | 6.06 | Yes |
Operating System | canonical | ubuntu_linux | 6.10 | Yes |