6.8
CVSSv2

CVE-2007-3257

Published: 19/06/2007 Updated: 16/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.

Vulnerable Product Search on Vulmon Subscribe to Product

gnome evolution 1.11

Vendor Advisories

Philip Van Hoof discovered that the IMAP client in Evolution did not correctly verify the SEQUENCE value A malicious or spoofed server could exploit this to execute arbitrary code with user privileges ...

References

NVD-CWE-Otherhttp://bugzilla.gnome.org/show_bug.cgi?id=447414http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.htmlhttp://www.debian.org/security/2007/dsa-1321http://www.debian.org/security/2007/dsa-1325http://www.gentoo.org/security/en/glsa/glsa-200707-03.xmlhttp://security.gentoo.org/glsa/glsa-200711-04.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:136http://www.redhat.com/support/errata/RHSA-2007-0509.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0510.htmlftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.aschttp://www.novell.com/linux/security/advisories/2007_42_evolution.htmlhttp://www.novell.com/linux/security/advisories/2007_14_sr.htmlhttp://www.ubuntu.com/usn/usn-475-1http://www.securityfocus.com/bid/24567http://www.securitytracker.com/id?1018284http://secunia.com/advisories/25766http://secunia.com/advisories/25765http://secunia.com/advisories/25774http://secunia.com/advisories/25798http://secunia.com/advisories/25777http://secunia.com/advisories/25793http://secunia.com/advisories/25843http://secunia.com/advisories/25894http://secunia.com/advisories/25906http://secunia.com/advisories/25880http://secunia.com/advisories/25958http://secunia.com/advisories/26083http://www.vupen.com/english/advisories/2007/2282http://osvdb.org/37489https://exchange.xforce.ibmcloud.com/vulnerabilities/34964https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724http://www.securityfocus.com/archive/1/471455/100/0/threadedhttps://usn.ubuntu.com/475-1/https://nvd.nist.gov