7.5
CVSSv2

CVE-2005-2550

Published: 12/08/2005 Updated: 03/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in Evolution 1.4 up to and including 2.3.6.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via the calendar entries such as task lists, which are not properly handled when the user selects the Calendars tab.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome evolution 1.4

gnome evolution 2.3.3

gnome evolution 2.3.4

gnome evolution 2.1

gnome evolution 2.2

gnome evolution 2.3.1

gnome evolution 2.3.2

gnome evolution 1.5

gnome evolution 2.0

gnome evolution 2.3.5

gnome evolution 2.3.6.1

Vendor Advisories

Synopsis Evolution security update Type/Severity Security Advisory: Important Topic Updated evolution packages that fix a format string issue are now availableThis update has been rated as having important security impact by the RedHat Security Response Team Description Evolution is the G ...
Debian Bug report logs - #322535 evolution: Multiple format string vulnerabilities in Evolution Package: evolution; Maintainer for evolution is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Source for evolution is src:evolution (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilo ...
Ulf Härnhammar discovered several format string vulnerabilities in Evolution, a free groupware suite, that could lead to crashes of the application or the execution of arbitrary code For the old stable distribution (woody) these problems have been fixed in version 105-1woody3 For the stable distribution (sarge) these problems have been fixed i ...