Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Seamonkey | Mozilla | * | 1.0.6 (including) |
Thunderbird | Mozilla | * | 1.5.0.8 (including) |
Red Hat Enterprise Linux 2.1 | RedHat | seamonkey-0:1.0.7-0.1.el2 | * |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.7-0.1.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | devhelp-0:0.10-0.6.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | seamonkey-0:1.0.7-0.1.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | thunderbird-0:1.5.0.9-0.1.el4 | * |
Mozilla-thunderbird | Ubuntu | dapper | * |
Mozilla-thunderbird | Ubuntu | edgy | * |
Mozilla-thunderbird | Ubuntu | feisty | * |