Integer overflow in camel-lock-helper in Evolution 2.0.2 and previous versions allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnome evolution |
||
debian debian linux 3.0 |