First published: Wed Dec 20 2006(Updated: )
Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <=1.5.0.8 | |
Mozilla SeaMonkey | <=1.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6505 has a high severity rating due to the potential for remote code execution.
To fix CVE-2006-6505, update Mozilla Thunderbird to version 1.5.0.9 or later and SeaMonkey to version 1.0.7 or later.
If exploited, CVE-2006-6505 can allow attackers to execute arbitrary code on the affected systems.
CVE-2006-6505 affects Mozilla Thunderbird versions prior to 1.5.0.9 and SeaMonkey versions prior to 1.0.7.
CVE-2006-6505 allows for attacks via external message modifications with long Content-Type headers or long RFC2047-encoded headers.