From upstream: Bernd Jendrissek reported a crash in Thunderbird when viewing a multipart/alternative mail message with a text/enhanced part. Internally this led to operations on an unexpected type of object resulting in a crash which may be exploitable. http://www.mozilla.org/security/announce/2009/mfsa2009-33.html
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-2210 to the following vulnerability: Name: CVE-2009-2210 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210 Assigned: 20090625 Reference: CONFIRM: http://www.mozilla.org/security/announce/2009/mfsa2009-33.html Reference: CONFIRM: https://bugzilla.mozilla.org/show_bug.cgi?id=495057 Reference: BID:35461 Reference: URL: http://www.securityfocus.com/bid/35461 Reference: SECTRACK:1022433 Reference: URL: http://securitytracker.com/id?1022433 Reference: XF:mozilla-multipart-alternative-code-exec(51315) Reference: URL: http://xforce.iss.net/xforce/xfdb/51315 Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Via RHSA-2009:1134 https://rhn.redhat.com/errata/RHSA-2009-1134.html
seamonkey-1.1.17-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
seamonkey-1.1.17-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.