9.3
CVSSv2

CVE-2007-1282

Published: 06/03/2007 Updated: 11/10/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in Mozilla Thunderbird prior to 1.5.0.10 and SeaMonkey prior to 1.0.8 allows remote malicious users to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey 1.0.3

mozilla seamonkey 1.0.4

mozilla thunderbird 0.4

mozilla thunderbird 0.5

mozilla thunderbird 1.0

mozilla thunderbird 1.0.1

mozilla thunderbird 1.0.8

mozilla thunderbird 1.5

mozilla thunderbird 1.5.0.8

mozilla thunderbird 1.5.0.9

mozilla seamonkey 1.0.1

mozilla seamonkey 1.0.2

mozilla thunderbird 0.2

mozilla thunderbird 0.3

mozilla thunderbird 0.8

mozilla thunderbird 0.9

mozilla thunderbird 1.0.6

mozilla thunderbird 1.0.7

mozilla thunderbird 1.5.0.6

mozilla thunderbird 1.5.0.7

mozilla seamonkey 1.0.5

mozilla seamonkey 1.0.6

mozilla thunderbird 0.6

mozilla thunderbird 0.7

mozilla thunderbird 0.7.1

mozilla thunderbird 1.0.2

mozilla thunderbird 1.0.3

mozilla thunderbird 1.5.0.1

mozilla thunderbird 1.5.0.2

mozilla seamonkey 1.0

mozilla seamonkey 1.0.7

mozilla thunderbird 0.1

mozilla thunderbird 0.7.2

mozilla thunderbird 0.7.3

mozilla thunderbird 1.0.4

mozilla thunderbird 1.0.5

mozilla thunderbird 1.5.0.3

mozilla thunderbird 1.5.0.4

Vendor Advisories

Several remote vulnerabilities have been discovered in Mozilla Firefox This will be the last security update of Mozilla-based products for the oldstable (sarge) distribution of Debian We recommend to upgrade to stable (etch) as soon as possible The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CVE-2007-1 ...