First published: Thu Feb 02 2006(Updated: )
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Evolution | =2.3.6 | |
GNOME Evolution | =2.3.5 | |
GNOME Evolution | =2.3.2 | |
GNOME Evolution | =2.3.6.1 | |
GNOME Evolution | =2.3.1 | |
GNOME Evolution | =2.3.7 | |
GNOME Evolution | =2.3.3 | |
GNOME Evolution | =2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0528 is classified as a denial of service vulnerability that can lead to persistent client crashes.
To fix CVE-2006-0528, update the GNOME Evolution application to a version that addresses this issue.
Versions 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6, 2.3.6.1, and 2.3.7 of GNOME Evolution are affected by CVE-2006-0528.
Yes, CVE-2006-0528 can be exploited remotely through a specially crafted text file attachment.
Users affected by CVE-2006-0528 may experience application crashes, leading to potential data loss and disruptions.