Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux | Redhat | 4.0 (including) | 4.0 (including) |
Enterprise_linux_desktop | Redhat | 4.0 (including) | 4.0 (including) |
Red Hat Enterprise Linux 2.1 | RedHat | seamonkey-0:1.0.8-0.2.el2 | * |
Red Hat Enterprise Linux 3 | RedHat | seamonkey-0:1.0.8-0.2.el3 | * |
Red Hat Enterprise Linux 4 | RedHat | devhelp-0:0.10-0.7.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | seamonkey-0:1.0.8-0.2.el4 | * |
Red Hat Enterprise Linux 4 | RedHat | thunderbird-0:1.5.0.10-0.1.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | thunderbird-0:1.5.0.10-1.el5 | * |
Mozilla-thunderbird | Ubuntu | dapper | * |
Mozilla-thunderbird | Ubuntu | edgy | * |
Mozilla-thunderbird | Ubuntu | feisty | * |