641
VMScore

CVE-2005-0102

Published: 24/01/2005 Updated: 08/02/2024
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in camel-lock-helper in Evolution 2.0.2 and previous versions allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome evolution

debian debian linux 3.0

Vendor Advisories

Max Vozeler discovered an integer overflow in camel-lock-helper An user-supplied length value was not validated, so that a value of -1 caused a buffer allocation of 0 bytes; this buffer was then filled by an arbitrary amount of user-supplied data ...
Synopsis evolution security update Type/Severity Security Advisory: Moderate Topic Updated evolution packages that fix various security issues are now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description Evolution is a GNO ...
Synopsis evolution security update Type/Severity Security Advisory: Low Topic Updated evolution packages that fix various bugs are now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Evolution is the GNOME collection of pe ...
Max Vozeler discovered an integer overflow in a helper application inside of Evolution, a free groupware suite A local attacker could cause the setuid root helper to execute arbitrary code with elevated privileges For the stable distribution (woody) this problem has been fixed in version 105-1woody2 For the unstable distribution (sid) this pro ...