← Zuruck zu CVEs
CVE-2007-1282
N/ABeschreibung
Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht3/6/2007
Zuletzt geandert4/23/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
mozilla:seamonkeymozilla:thunderbirdredhat:enterprise_linuxredhat:enterprise_linux_desktop
Referenzen
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc(secalert@redhat.com)
http://fedoranews.org/cms/node/2747(secalert@redhat.com)
http://fedoranews.org/cms/node/2749(secalert@redhat.com)
http://osvdb.org/33810(secalert@redhat.com)
http://secunia.com/advisories/24406(secalert@redhat.com)
http://secunia.com/advisories/24456(secalert@redhat.com)
http://secunia.com/advisories/24457(secalert@redhat.com)
http://secunia.com/advisories/24522(secalert@redhat.com)
http://secunia.com/advisories/25588(secalert@redhat.com)
http://security.gentoo.org/glsa/glsa-200703-18.xml(secalert@redhat.com)
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131(secalert@redhat.com)
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947(secalert@redhat.com)
http://www.debian.org/security/2007/dsa-1336(secalert@redhat.com)
http://www.mozilla.org/security/announce/2007/mfsa2007-10.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2007-0078.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2007-0108.html(secalert@redhat.com)
http://www.securityfocus.com/bid/22845(secalert@redhat.com)
http://www.vupen.com/english/advisories/2007/0824(secalert@redhat.com)
https://bugzilla.mozilla.org/show_bug.cgi?id=362735(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32810(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11313(secalert@redhat.com)
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc(af854a3a-2127-422b-91ae-364da2661108)
http://fedoranews.org/cms/node/2747(af854a3a-2127-422b-91ae-364da2661108)
http://fedoranews.org/cms/node/2749(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/33810(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24406(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24456(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24457(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24522(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/25588(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200703-18.xml(af854a3a-2127-422b-91ae-364da2661108)
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131(af854a3a-2127-422b-91ae-364da2661108)
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1336(af854a3a-2127-422b-91ae-364da2661108)
http://www.mozilla.org/security/announce/2007/mfsa2007-10.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0078.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0108.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/22845(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/0824(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=362735(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32810(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11313(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.