You are currently viewing a snapshot of taken on April 21, 2008. Most of this content is highly out of date (some pages haven't been updated since the project began in 1998) and exists for historical purposes only. If there are any pages on this archive site that you think should be added back to, please file a bug.

You are here: Known Vulnerabilities in Mozilla Products (Thunderbird > MFSA 2006-74

Mozilla Foundation Security Advisory 2006-74

Title: Mail header processing heap overflows
Impact: Critical
Announced: December 19, 2006
Reporter: Georgi Guninski, David Bienvenu
Products: Thunderbird, SeaMonkey

Fixed in: Thunderbird
  SeaMonkey 1.0.7


Georgi Guninski reported that long Content-Type headers in external message bodies could cause a heap buffer overflow when processing mail headers. While working on that code David Bienvenu discovered a similar overflow could occur when processing long rfc2047-encoded headers.

Either overflow could be exploited to execute arbitrary code.


None, upgrade to a fixed version immediately.