First published: Wed Jan 18 2006(Updated: )
GUI display truncation vulnerability in Mozilla Thunderbird 1.0.2, 1.0.6, and 1.0.7 allows user-assisted attackers to execute arbitrary code via an attachment with a filename containing a large number of spaces ending with a dangerous extension that is not displayed by Thunderbird, along with an inconsistent Content-Type header, which could be used to trick a user into downloading dangerous content by dragging or saving the attachment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | =1.0.7 | |
Thunderbird | =1.0 | |
Thunderbird | =1.0.1 | |
Thunderbird | =1.5-beta2 | |
Thunderbird | =1.0.2 | |
Thunderbird | =1.0.6 | |
Thunderbird | =1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0236 is considered a moderate severity vulnerability that allows for arbitrary code execution when exploiting the GUI display truncation in certain versions of Mozilla Thunderbird.
To mitigate CVE-2006-0236, users should update to the latest version of Mozilla Thunderbird or apply any available security patches that address this vulnerability.
CVE-2006-0236 affects Mozilla Thunderbird versions 1.0.2, 1.0.6, 1.0.7, and earlier, including some beta versions.
CVE-2006-0236 enables user-assisted attackers to execute arbitrary code on the victim's machine via specially crafted email attachments.
CVE-2006-0236 is considered a remote vulnerability because it can be exploited through email attachments without requiring local access to the system.