First published: Mon Jan 24 2005(Updated: )
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | <=2.0.2 | |
Debian GNU/Linux | =3.0 | |
Evolution Data Server | =1.2.2 | |
Evolution Data Server | =1.2.3 | |
Evolution Data Server | =1.3.2_beta | |
Evolution Data Server | =1.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0102 has a moderate severity rating due to the potential for local users and remote POP3 servers to exploit buffer overflow vulnerabilities.
To fix CVE-2005-0102, upgrade to a patched version of Evolution beyond 2.0.2.
CVE-2005-0102 affects Evolution 2.0.2 and earlier versions, as well as specific versions of Evolution Data Server.
Yes, CVE-2005-0102 can allow remote code execution through a buffer overflow triggered by a malicious POP3 server.
CVE-2005-0102 is considered both a local and remote vulnerability due to its exploitability by local users and remote malicious actors.