Lucene search

K
cveRedhatCVE-2007-1282
HistoryMar 06, 2007 - 2:19 a.m.

CVE-2007-1282

2007-03-0602:19:00
redhat
web.nvd.nist.gov
47
cve
2007
1282
mozilla
thunderbird
seamonkey
buffer overflow
arbitrary code execution
email
security vulnerability

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.7

Confidence

Low

EPSS

0.813

Percentile

98.4%

Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line.

Affected configurations

Nvd
Node
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation
OR
redhatenterprise_linux_desktopMatch4.0
AND
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillathunderbirdMatch0.1
OR
mozillathunderbirdMatch0.2
OR
mozillathunderbirdMatch0.3
OR
mozillathunderbirdMatch0.4
OR
mozillathunderbirdMatch0.5
OR
mozillathunderbirdMatch0.6
OR
mozillathunderbirdMatch0.7
OR
mozillathunderbirdMatch0.7.1
OR
mozillathunderbirdMatch0.7.2
OR
mozillathunderbirdMatch0.7.3
OR
mozillathunderbirdMatch0.8
OR
mozillathunderbirdMatch0.9
OR
mozillathunderbirdMatch1.0
OR
mozillathunderbirdMatch1.0.1
OR
mozillathunderbirdMatch1.0.2
OR
mozillathunderbirdMatch1.0.3
OR
mozillathunderbirdMatch1.0.4
OR
mozillathunderbirdMatch1.0.5
OR
mozillathunderbirdMatch1.0.6
OR
mozillathunderbirdMatch1.0.7
OR
mozillathunderbirdMatch1.0.8
OR
mozillathunderbirdMatch1.5
OR
mozillathunderbirdMatch1.5.0.1
OR
mozillathunderbirdMatch1.5.0.2
OR
mozillathunderbirdMatch1.5.0.3
OR
mozillathunderbirdMatch1.5.0.4
OR
mozillathunderbirdMatch1.5.0.6
OR
mozillathunderbirdMatch1.5.0.7
OR
mozillathunderbirdMatch1.5.0.8
OR
mozillathunderbirdMatch1.5.0.9
VendorProductVersionCPE
redhatenterprise_linux4.0cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
redhatenterprise_linux4.0cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
redhatenterprise_linux4.0cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
redhatenterprise_linux_desktop4.0cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
mozillaseamonkey1.0cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
mozillaseamonkey1.0.1cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
mozillaseamonkey1.0.2cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
mozillaseamonkey1.0.3cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
mozillaseamonkey1.0.4cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*
mozillaseamonkey1.0.5cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 421

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.7

Confidence

Low

EPSS

0.813

Percentile

98.4%