You are here: Known Vulnerabilities in Mozilla Products (Thunderbird > MFSA 2006-74

Mozilla Foundation Security Advisory 2006-74

Title: Mail header processing heap overflows
Impact: Critical
Announced: December 19, 2006
Reporter: Georgi Guninski, David Bienvenu
Products: Thunderbird, SeaMonkey

Fixed in: Thunderbird
  SeaMonkey 1.0.7


Georgi Guninski reported that long Content-Type headers in external message bodies could cause a heap buffer overflow when processing mail headers. While working on that code David Bienvenu discovered a similar overflow could occur when processing long rfc2047-encoded headers.

Either overflow could be exploited to execute arbitrary code.


None, upgrade to a fixed version immediately.