{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-03-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"Integer overflow in Mozilla Thunderbird before 1.5.0.10 and SeaMonkey before 1.0.8 allows remote attackers to trigger a buffer overflow and possibly execute arbitrary code via a text/enhanced or text/richtext e-mail message with an extremely long line."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"RHSA-2007:0078","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"name":"FEDORA-2007-308","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://fedoranews.org/cms/node/2747"},{"name":"RHSA-2007:0108","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"name":"oval:org.mitre.oval:def:11313","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11313"},{"name":"24406","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24406"},{"name":"24457","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24457"},{"name":"33810","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/33810"},{"name":"DSA-1336","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2007/dsa-1336"},{"name":"FEDORA-2007-309","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://fedoranews.org/cms/node/2749"},{"name":"GLSA-200703-18","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-200703-18.xml"},{"name":"mozilla-email-messages-overflow(32810)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32810"},{"name":"25588","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25588"},{"name":"SSA:2007-066-04","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947"},{"name":"24456","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24456"},{"name":"24522","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24522"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=362735"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-10.html"},{"name":"22845","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/22845"},{"name":"20070202-01-P","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"name":"SSA:2007-066-05","tags":["vendor-advisory","x_refsource_SLACKWARE"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"name":"ADV-2007-0824","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/0824"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T12:50:35.162Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2007:0078","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0078.html"},{"name":"FEDORA-2007-308","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://fedoranews.org/cms/node/2747"},{"name":"RHSA-2007:0108","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0108.html"},{"name":"oval:org.mitre.oval:def:11313","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11313"},{"name":"24406","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24406"},{"name":"24457","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24457"},{"name":"33810","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/33810"},{"name":"DSA-1336","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2007/dsa-1336"},{"name":"FEDORA-2007-309","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://fedoranews.org/cms/node/2749"},{"name":"GLSA-200703-18","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-200703-18.xml"},{"name":"mozilla-email-messages-overflow(32810)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32810"},{"name":"25588","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25588"},{"name":"SSA:2007-066-04","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947"},{"name":"24456","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24456"},{"name":"24522","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24522"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=362735"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.mozilla.org/security/announce/2007/mfsa2007-10.html"},{"name":"22845","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/22845"},{"name":"20070202-01-P","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc"},{"name":"SSA:2007-066-05","tags":["vendor-advisory","x_refsource_SLACKWARE","x_transferred"],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131"},{"name":"ADV-2007-0824","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/0824"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2007-1282","datePublished":"2007-03-06T02:00:00.000Z","dateReserved":"2007-03-05T00:00:00.000Z","dateUpdated":"2024-08-07T12:50:35.162Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}