Mozilla Foundation Security Advisory 2006-74

Type securityvulns
Reporter Securityvulns
Modified 2006-12-20T00:00:00


Mozilla Foundation Security Advisory 2006-74 Title: Mail header processing heap overflows Impact: Critical Announced: December 19, 2006 Reporter: Georgi Guninski, David Bienvenu Products: Thunderbird, SeaMonkey

Fixed in: Thunderbird SeaMonkey 1.0.7 Description Georgi Guninski reported that long Content-Type headers in external message bodies could cause a heap buffer overflow when processing mail headers. While working on that code David Bienvenu discovered a similar overflow could occur when processing long rfc2047-encoded headers.

Either overflow could be exploited to execute arbitrary code. Workaround None, upgrade to a fixed version immediately. References CVE-2006-6505