Overview
Mozilla Thunderbird contains a heap-based buffer overflow which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Mozilla Thunderbird is an open source, cross-platform email and news client. Thunderbird uses Multipurpose Internet Message Extensions (MIME) which extends support in Thunderbird for multi-part message bodies, non-text attachments, and non-ASCII character sets. A vulnerability exists in the way Mozilla Thunderbird parses external-body MIME type in an electronic mail which may result in a heap-based buffer overflow. According to Mozilla Foundation Security Advisory 2008-12: The vulnerability is caused by allocating a buffer that can be three bytes too small in certain cases when viewing an email message with an external MIME body. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code on a system running a vulnerable version of Mozilla Thunderbird. |
Solution
Apply Update
|
Apply Workaround
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported to VeriSign iDefense by regenrecht.
This document was written by Joseph W. Pruszynski.
Other Information
CVE IDs: | CVE-2008-0304 |
Severity Metric: | 31.00 |
Date Public: | 2008-02-26 |
Date First Published: | 2008-03-06 |
Date Last Updated: | 2008-03-06 13:45 UTC |
Document Revision: | 24 |