First published: Mon Jan 24 2005(Updated: )
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ximian Evolution | =1.2.2 | |
Ximian Evolution | =1.2.3 | |
Ximian Evolution | =1.3.2_beta | |
Ximian Evolution | =1.2.4 | |
GNOME Evolution | <=2.0.2 | |
Debian Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.