Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long header in a news article, related to "canceling [a] newsgroup message" and "cancelled newsgroup messages."
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html
https://bugzilla.mozilla.org/show_bug.cgi?id=425152
http://secunia.com/advisories/32010
http://secunia.com/advisories/32025
http://secunia.com/advisories/32044
http://secunia.com/advisories/32082
http://secunia.com/advisories/32092
http://secunia.com/advisories/32196
http://secunia.com/advisories/33433
http://secunia.com/advisories/33434
http://secunia.com/advisories/34501
https://exchange.xforce.ibmcloud.com/vulnerabilities/45426
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10933
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
http://www.debian.org/security/2009/dsa-1696
http://www.debian.org/security/2009/dsa-1697
http://www.mandriva.com/security/advisories?name=MDVSA-2008:206
http://www.mozilla.org/security/announce/2008/mfsa2008-46.html
http://www.redhat.com/support/errata/RHSA-2008-0908.html
http://www.securitytracker.com/id?1020948