First published: Fri Aug 12 2005(Updated: )
Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | =1.5 | |
GNOME Evolution | =2.3.5 | |
GNOME Evolution | =2.3.2 | |
GNOME Evolution | =2.2 | |
GNOME Evolution | =2.1 | |
GNOME Evolution | =2.3.6.1 | |
GNOME Evolution | =2.3.1 | |
GNOME Evolution | =2.3.3 | |
GNOME Evolution | =2.3.4 | |
GNOME Evolution | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2549 has a high severity rating due to its potential to cause remote denial of service and execute arbitrary code.
To address CVE-2005-2549, upgrade Evolution to a version that is not affected, such as versions higher than 2.3.6.1.
CVE-2005-2549 affects Evolution versions from 1.5 to 2.3.6.1.
CVE-2005-2549 can be exploited through malformed vCard data, remote LDAP contact data, or task list data from remote servers.
The impacts of CVE-2005-2549 include application crashes and the possibility of executing arbitrary code on the affected system.