{"vuid":"VU#179014","idnumber":"179014","name":"Mozilla CSS integer overflow vulnerability","keywords":["Mozilla","Firefox","Thunderbird","SeaMonkey","mozilla_April_2006"],"overview":"Mozilla products contain an integer overflow that could allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Cascading Style Sheets CSS is a mechanism for adding style to web documents. The problem Mozilla products contain an integer overflow in the CSS letter spacing property. This may allow a remote attacker to manipulate memory allocation routines to create an undersized buffer. When data is copied to this buffer, a heap-based buffer overflow may occur. For a list of affected, products refer to Mozilla Foundation Security Advisory 2006-22.","impact":"If an attacker can persuade a user to access a specially crafted web page, that attacker may be able to execute arbitrary code.","resolution":"Upgrade\nRefer to Mozilla Foundation Security Advisory 2006-22 for fixed versions of Mozilla products.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Mozilla Foundation Security Advisory \n2006-22","author":"This document was written by Jeff Gennari.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-22.html","http://www.w3.org/Style/CSS/","https://bugzilla.mozilla.org/show_bug.cgi?id=325403"],"cveids":["CVE-2006-1730"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-04-17T12:20:22Z","publicdate":"2006-04-13T00:00:00Z","datefirstpublished":"2006-04-17T14:12:27Z","dateupdated":"2006-05-17T12:43:33Z","revision":21,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"18","cam_impact":"17","cam_easeofexploitation":"16","cam_attackeraccessrequired":"19","cam_scorecurrent":"31.3956","cam_scorecurrentwidelyknown":"40.1166","cam_scorecurrentwidelyknownexploited":"75.0006","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":31.3956,"vulnote":null}