Vulnerability Name:

CVE-2008-0304 (CCN-40869)

Assigned:2008-02-26
Published:2008-02-26
Updated:2017-09-29
Summary:Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-0304

Source: IDEFENSE
Type: UNKNOWN
20080226 Mozilla Thunderbird MIME External-Body Heap Overflow Vulnerability

Source: CCN
Type: RHSA-2008-0104
Critical: seamonkey security update

Source: CCN
Type: RHSA-2008-0105
Moderate: thunderbird security update

Source: SECUNIA
Type: UNKNOWN
29098

Source: CCN
Type: SA29133
Mozilla Thunderbird MIME Processing Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
29133

Source: SECUNIA
Type: UNKNOWN
29167

Source: SECUNIA
Type: UNKNOWN
29211

Source: SECUNIA
Type: UNKNOWN
30327

Source: CCN
Type: SA31043
Sun Solaris Thunderbird Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31043

Source: SECUNIA
Type: UNKNOWN
31253

Source: SECUNIA
Type: UNKNOWN
33433

Source: CCN
Type: SECTRACK ID: 1019504
Mozilla Thunderbird Buffer Overflow in Parsing External-Body MIME Content

Source: SECTRACK
Type: UNKNOWN
1019504

Source: SLACKWARE
Type: UNKNOWN
SSA:2008-061-01

Source: SUNALERT
Type: UNKNOWN
239546

Source: CCN
Type: Sun Alert ID: 239546
Security Vulnerabilities in Thunderbird for Solaris May Result in Privilege Escalation or Cross-Site Scripting (XSS)

Source: DEBIAN
Type: UNKNOWN
DSA-1621

Source: DEBIAN
Type: UNKNOWN
DSA-1697

Source: DEBIAN
Type: DSA-1621
icedove -- several vulnerabilities

Source: DEBIAN
Type: DSA-1697
iceape -- several vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200805-18

Source: CCN
Type: US-CERT VU#661651
Mozilla Thunderbird external-body MIME type buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#661651

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:062

Source: CCN
Type: Mozilla Web site
Mozilla Products

Source: CCN
Type: MFSA 2008-12
Heap buffer overflow in external MIME bodies

Source: CONFIRM
Type: UNKNOWN
http://www.mozilla.org/security/announce/2008/mfsa2008-12.html

Source: CCN
Type: OSVDB ID: 42428
Mozilla Multiple Products E-mail Handling MIME Processing Overflow

Source: BID
Type: Patch
28012

Source: CCN
Type: BID-28012
Mozilla Thunderbird External-Body MIME Remote Heap Buffer Overflow Vulnerability

Source: CCN
Type: USN-582-1
Thunderbird vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-582-1

Source: CCN
Type: USN-582-2
Thunderbird regression

Source: UBUNTU
Type: UNKNOWN
USN-582-2

Source: CCN
Type: USN-629-1
Thunderbird vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2008-2091

Source: XF
Type: UNKNOWN
thunderbird-mimetypes-bo(40869)

Source: CCN
Type: iDefense Labs PUBLIC ADVISORY: 02.26.08
Mozilla Thunderbird MIME External-Body Heap Overflow Vulnerability

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11075

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2060

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-2118

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version <= 1.1.7)
  • OR cpe:/a:mozilla:thunderbird:*:*:*:*:*:*:*:* (Version <= 2.0.0.9)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/a:redhat:rhel_productivity:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1::beta:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_89::x86:*:*:*:*:*
  • OR cpe:/o:sun:opensolaris:build_snv_89::sparc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:17244
    P
    USN-582-2 -- mozilla-thunderbird
    2014-07-21
    oval:org.mitre.oval:def:17594
    P
    USN-582-1 -- mozilla-thunderbird, thunderbird vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17765
    P
    USN-629-1 -- mozilla-thunderbird, thunderbird vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:13245
    P
    DSA-1697-1 iceape -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18570
    P
    DSA-1621-1 icedove - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7564
    P
    DSA-1621 icedove -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7950
    P
    DSA-1697 iceape -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:21756
    P
    ELSA-2008:0105: thunderbird security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:11075
    V
    Heap-based buffer overflow in Mozilla Thunderbird before 2.0.0.12 and SeaMonkey before 1.1.8 might allow remote attackers to execute arbitrary code via a crafted external-body MIME type in an e-mail message, related to an incorrect memory allocation during message preview.
    2013-04-29
    oval:org.debian:def:1697
    V
    several vulnerabilities
    2009-01-07
    oval:org.debian:def:1621
    V
    several vulnerabilities
    2008-07-27
    oval:com.redhat.rhsa:def:20080104
    P
    RHSA-2008:0104: seamonkey security update (Critical)
    2008-03-20
    oval:com.redhat.rhsa:def:20080105
    P
    RHSA-2008:0105: thunderbird security update (Critical)
    2008-02-27
    BACK
    linux linux kernel *
    microsoft windows *
    mozilla seamonkey *
    mozilla thunderbird *
    mozilla thunderbird 2.0.0.5
    mozilla seamonkey 1.1.3
    mozilla thunderbird 2.0.0.4
    mozilla thunderbird 2.0.0.3
    mozilla thunderbird 2.0.0.2
    mozilla thunderbird 2.0.0.1
    mozilla seamonkey 1.1.2
    mozilla seamonkey 1.1.1
    mozilla thunderbird 2.0.0.6
    mozilla thunderbird 2.0.0.7
    mozilla seamonkey 1.1.4
    mozilla seamonkey 1.1.5
    mozilla seamonkey 1.1.6
    mozilla thunderbird 2.0.0.9
    mozilla thunderbird 2.0.0.0
    mozilla thunderbird 2.0.0.11
    mozilla thunderbird 2.0.0.8
    mozilla seamonkey 1.1
    mozilla seamonkey 1.1.7
    mozilla seamonkey 1.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga
    canonical ubuntu 8.04
    sun opensolaris build_snv_89
    sun opensolaris build_snv_89