First published: Sat Mar 14 2009(Updated: )
Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Evolution Data Server | <=2.24.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0587 is classified as a high-severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2009-0587, upgrade Evolution Data Server to version 2.24.5 or later.
CVE-2009-0587 allows context-dependent attackers to execute arbitrary code via specially crafted long strings.
CVE-2009-0587 affects versions of Evolution Data Server up to and including 2.24.4.
CVE-2009-0587 exposes vulnerabilities in addressbook/libebook/e-vcard.c and camel/camel-mime-utils.c.