Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-2210

Опубликовано: 25 июн. 2009
Источник: debian
EPSS Низкий

Описание

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
icedovefixed2.0.0.22-1package
icedovefixed2.0.0.22-0lenny1squeezepackage
iceapefixed1.1.17-1package
iceapenot-affectedsqueezepackage
iceapenot-affectedlennypackage
iceapeend-of-lifeetchpackage
kompozernot-affectedpackage

Примечания

  • http://www.mozilla.org/security/announce/2009/mfsa2009-33.html

  • https://bugzilla.mozilla.org/show_bug.cgi?id=495057

EPSS

Процентиль: 90%
0.05533
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.

redhat
больше 16 лет назад

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.

nvd
больше 16 лет назад

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.

github
почти 4 года назад

Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.

EPSS

Процентиль: 90%
0.05533
Низкий