Vulnerability Note VU#887332
Mozilla mail products vulnerable to heap buffer overflow via Content-Type headers
Mozilla mail products contain a heap buffer overflow vulnerability in the way they process Content-Type headers. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Mozilla Thunderbird and SeaMonkey contain a buffer overflow vulnerability. Both applications fail to properly process long Content-Type headers in external message bodies.
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla||Affected||-||20 Dec 2006|
CVSS Metrics (Learn More)
This vulnerability was reported in Mozilla Foundation Security Advisory 2006-74. Mozilla credits Georgi Guninski.
This document was written by Katie Steiner.
- CVE IDs: CVE-2006-6505
- Date Public: 19 Dec 2006
- Date First Published: 20 Dec 2006
- Date Last Updated: 31 Jan 2007
- Severity Metric: 26.72
- Document Revision: 25
If you have feedback, comments, or additional information about this vulnerability, please send us email.