Multiple heap-based buffer overflows in Mozilla Thunderbird before 1.5.0.9 and SeaMonkey before 1.0.7 allow remote attackers to execute arbitrary code via (1) external message modies with long Content-Type headers or (2) long RFC2047-encoded (MIME non-ASCII) headers.
- http://www.novell.com/linux/security/advisories/2007_06_mozilla.html
- http://www.ubuntu.com/usn/usn-400-1
No PoCs found on GitHub currently.