Overview
Mozilla products fail to properly handle certain JavaScript regular expressions. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition.
Description
According to Mozilla Foundation Security Advisory 2006-57: ...a regular expression that ends with a backslash inside an unterminated character set (e.g. "[\\") will cause the regular epression engine to read beyond the end of the buffer, possibly leading to a crash.  | 
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.  | 
Solution
Upgrade  | 
Disable JavaScript 
  | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This issue was reported in Mozilla Foundation Security Advisory 2006-57. Mozilla credits Priit Laes, CanadianGuy, Girts Folkmanis, and Catalin Patulea for reporting this issue.
This document was written by Chris Taschner.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 27.00 | 
| Date Public: | 2006-09-15 | 
| Date First Published: | 2006-09-20 | 
| Date Last Updated: | 2006-10-02 13:53 UTC | 
| Document Revision: | 26 |