Vulnerability Note VU#661651
Mozilla Thunderbird external-body MIME type buffer overflow
Mozilla Thunderbird contains a heap-based buffer overflow which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Mozilla Thunderbird is an open source, cross-platform email and news client. Thunderbird uses Multipurpose Internet Message Extensions (MIME) which extends support in Thunderbird for multi-part message bodies, non-text attachments, and non-ASCII character sets. A vulnerability exists in the way Mozilla Thunderbird parses external-body MIME type in an electronic mail which may result in a heap-based buffer overflow. According to Mozilla Foundation Security Advisory 2008-12:
The vulnerability is caused by allocating a buffer that can be three bytes too small in certain cases when viewing an email message with an external MIME body.
A remote, unauthenticated attacker may be able to execute arbitrary code on a system running a vulnerable version of Mozilla Thunderbird.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla||Affected||-||06 Mar 2008|
CVSS Metrics (Learn More)
This vulnerability was reported to VeriSign iDefense by regenrecht.
This document was written by Joseph W. Pruszynski.
- CVE IDs: CVE-2008-0304
- Date Public: 26 Feb 2008
- Date First Published: 06 Mar 2008
- Date Last Updated: 06 Mar 2008
- Severity Metric: 31.00
- Document Revision: 23
If you have feedback, comments, or additional information about this vulnerability, please send us email.