{"vuid":"VU#887332","idnumber":"887332","name":"Mozilla mail products vulnerable to heap buffer overflow via Content-Type headers","keywords":["Mozilla","heap overflow","Content-Type headers","message bodies","mozilla_20061219","MFSA 2006-74"],"overview":"Mozilla mail products contain a heap buffer overflow vulnerability in the way they process Content-Type headers. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Mozilla Thunderbird and SeaMonkey contain a buffer overflow vulnerability. Both applications fail to properly process long Content-Type headers in external message bodies.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system","resolution":"Upgrade Mozilla has addressed these vulnerabilities in Thunderbird 1.5.0.9 and SeaMonkey 1.0.7.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Mozilla Foundation Security Advisory 2006-74. Mozilla credits Georgi Guninski.","author":"This document was written by Katie Steiner.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-74.html","http://secunia.com/advisories/23439/","http://secunia.com/advisories/23591/","http://secunia.com/advisories/23598/","http://secunia.com/advisories/23514/","http://www.securityfocus.com/bid/21668"],"cveids":["CVE-2006-6505"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-12-20T20:42:12Z","publicdate":"2006-12-19T00:00:00Z","datefirstpublished":"2006-12-20T23:06:08Z","dateupdated":"2007-01-31T21:54:39Z","revision":31,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"26.71875","cam_scorecurrentwidelyknown":"29.925","cam_scorecurrentwidelyknownexploited":"51.3","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":26.71875,"vulnote":null}