DSA-673-1 evolution -- integer overflow

Related Vulnerabilities: CVE-2005-0102  

Max Vozeler discovered an integer overflow in a helper application inside of Evolution, a free groupware suite. A local attacker could cause the setuid root helper to execute arbitrary code with elevated privileges. For the stable distribution (woody) this problem has been fixed in version 1.0.5-1woody2. For the unstable distribution (sid) this problem has been fixed in version 2.0.3-1.2. We recommend that you upgrade your evolution package.

Debian Security Advisory

DSA-673-1 evolution -- integer overflow

Date Reported:
10 Feb 2005
Affected Packages:
evolution
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 12354.
In Mitre's CVE dictionary: CVE-2005-0102.
More information:

Max Vozeler discovered an integer overflow in a helper application inside of Evolution, a free groupware suite. A local attacker could cause the setuid root helper to execute arbitrary code with elevated privileges.

For the stable distribution (woody) this problem has been fixed in version 1.0.5-1woody2.

For the unstable distribution (sid) this problem has been fixed in version 2.0.3-1.2.

We recommend that you upgrade your evolution package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.dsc
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2.diff.gz
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_alpha.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_arm.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_arm.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_i386.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_i386.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_ia64.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_m68k.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_m68k.deb
PowerPC:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_powerpc.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_s390.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_s390.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/e/evolution/evolution_1.0.5-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel-dev_1.0.5-1woody2_sparc.deb
http://security.debian.org/pool/updates/main/e/evolution/libcamel0_1.0.5-1woody2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.