CVE-2006-6505

NameCVE-2006-6505
DescriptionMultiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
SourceCVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1265-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
icedove (PTS)wheezy31.8.0-1~deb7u1fixed
wheezy (security)38.8.0-1~deb7u1.1fixed
jessie31.8.0-1~deb8u1fixed
jessie (security)38.8.0-1~deb8u1fixed
stretch38.6.0-1fixed
sid1:45.1.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iceapesource(unstable)1.0.7-1high
icedovesource(unstable)1.5.0.9.dfsg1-1high
mozillasource(unstable)(unfixed)medium
mozillasourcesarge2:1.7.8-1sarge10mediumDSA-1265-1

Notes

MFSA-2006-74
[sarge] - mozilla-thunderbird <no-dsa> (Mozilla products from Sarge no longer supported)

Search for package or bug name: Reporting problems