{"id":"CVE-2006-6499","details":"The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision.","modified":"2025-08-09T19:01:28Z","published":"2006-12-20T01:28:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/23282"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23420"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23422"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23545"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23589"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23591"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23614"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23672"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23692"},{"type":"ADVISORY","url":"http://secunia.com/advisories/23988"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24078"},{"type":"ADVISORY","url":"http://secunia.com/advisories/24390"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200701-02.xml"},{"type":"WEB","url":"http://securitytracker.com/id?1017398"},{"type":"WEB","url":"http://securitytracker.com/id?1017405"},{"type":"WEB","url":"http://securitytracker.com/id?1017406"},{"type":"ADVISORY","url":"http://www.debian.org/security/2007/dsa-1253"},{"type":"ADVISORY","url":"http://www.debian.org/security/2007/dsa-1258"},{"type":"ADVISORY","url":"http://www.debian.org/security/2007/dsa-1265"},{"type":"ADVISORY","url":"http://www.gentoo.org/security/en/glsa/glsa-200701-04.xml"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/427972"},{"type":"ADVISORY","url":"http://www.mozilla.org/security/announce/2006/mfsa2006-68.html"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_80_mozilla.html"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2007_06_mozilla.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/21668"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-398-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-398-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-400-1"},{"type":"WEB","url":"http://www.us-cert.gov/cas/techalerts/TA06-354A.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/5068"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1124"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/0083"},{"type":"WEB","url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102846-1"}],"schema_version":"1.7.3"}