Summary
The host is installed with Thunderbird/Seamonkey and is prone to Denial Of Service vulnerability.
Impact
Successful exploitation will allow attackers to cause a denial of service or possibly execute arbitrary code via a crafted message, related to message indexing.
Impact Level: Application
Solution
Upgrade to Seamonkey version 1.1.19 or later
http://www.seamonkey-project.org/releases
Upgrade to Thunderbird version 2.0.0.24 or later
http://www.mozillamessaging.com/en-US/thunderbird/all.html
Insight
The flaw exists when processing e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to crash the application.
Affected
Seamonkey version prior to 1.1.19 and
Thunderbird version prior to 2.0.0.24 on Linux.
References
Severity
Classification
-
CVE CVE-2010-0163 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- Apache Traffic Server HTTP Host Header Denial of Service Vulnerability
- Comodo Internet Security Denial of Service Vulnerability July 13
- ejabberd 'client2server' Message Remote Denial of Service Vulnerability
- freeFTPD PORT Command Denial of Service Vulnerability
- freeSSHd Pre-Authentication Error Remote DoS Vulnerability