CVE-2008-4070

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long header in a news article, related to "canceling [a] newsgroup message" and "cancelled newsgroup messages."

References

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00005.html

http://secunia.com/advisories/32010

http://secunia.com/advisories/32025

http://secunia.com/advisories/32044

http://secunia.com/advisories/32082

http://secunia.com/advisories/32092

http://secunia.com/advisories/32196

http://secunia.com/advisories/33433

http://secunia.com/advisories/33434

http://secunia.com/advisories/34501

http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.379422

http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.412123

http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1

http://www.debian.org/security/2009/dsa-1696

http://www.debian.org/security/2009/dsa-1697

http://www.mandriva.com/security/advisories?name=MDVSA-2008:206

http://www.mozilla.org/security/announce/2008/mfsa2008-46.html

http://www.redhat.com/support/errata/RHSA-2008-0908.html

http://www.securityfocus.com/bid/31411

http://www.securitytracker.com/id?1020948

http://www.ubuntu.com/usn/usn-647-1

http://www.vupen.com/english/advisories/2009/0977

https://bugzilla.mozilla.org/show_bug.cgi?id=425152

https://exchange.xforce.ibmcloud.com/vulnerabilities/45426

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10933

Details

Source: MITRE

Published: 2008-09-27

Updated: 2017-09-29

Type: CWE-119

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* versions up to 1.1.11 (inclusive)

cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.5:beta:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.13:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:2.0.0.15:*:*:*:*:*:*:*

cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* versions up to 2.0.0.16 (inclusive)

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
67754Oracle Linux 4 : thunderbird (ELSA-2008-0908)NessusOracle Linux Local Security Checks
critical
63402GLSA-201301-01 : Mozilla Products: Multiple vulnerabilities (BEAST)NessusGentoo Local Security Checks
critical
60478Scientific Linux Security Update : thunderbird on SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
39893openSUSE Security Update : MozillaThunderbird (MozillaThunderbird-236)NessusSuSE Local Security Checks
critical
37910Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : mozilla-thunderbird, thunderbird vulnerabilities (USN-647-1)NessusUbuntu Local Security Checks
critical
37308Mandriva Linux Security Advisory : mozilla-thunderbird (MDVSA-2008:206)NessusMandriva Local Security Checks
critical
35314Debian DSA-1697-1 : iceape - several vulnerabilitiesNessusDebian Local Security Checks
critical
35313Debian DSA-1696-1 : icedove - several vulnerabilitiesNessusDebian Local Security Checks
critical
34837Fedora 9 : thunderbird-2.0.0.18-1.fc9 (2008-9859)NessusFedora Local Security Checks
critical
34836Fedora 8 : thunderbird-2.0.0.18-1.fc8 (2008-9807)NessusFedora Local Security Checks
critical
34345openSUSE 10 Security Update : MozillaThunderbird (MozillaThunderbird-5655)NessusSuSE Local Security Checks
critical
34339CentOS 4 / 5 : thunderbird (CESA-2008:0908)NessusCentOS Local Security Checks
critical
34330RHEL 4 / 5 : thunderbird (RHSA-2008:0908)NessusRed Hat Local Security Checks
critical
34300Slackware 10.2 / 11.0 / 12.0 / 12.1 / current : mozilla-thunderbird (SSA:2008-270-01)NessusSlackware Local Security Checks
critical
4696Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesNessus Network MonitorSMTP Clients
medium
34296Slackware 11.0 / 12.0 / 12.1 / current : seamonkey (SSA:2008-269-02)NessusSlackware Local Security Checks
critical
34294Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesNessusWindows
high
4693SeaMonkey < 1.1.12 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
34269SeaMonkey < 1.1.12 Multiple VulnerabilitiesNessusWindows
high
801289Mozilla Thunderbird < 2.0.0.17 Multiple VulnerabilitiesLog Correlation EngineSMTP Clients
high
800877SeaMonkey < 1.1.12 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high