First published: Thu Aug 25 2011(Updated: )
GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
GNOME Evolution | =2.4 | |
GNOME Evolution | =2.0.1 | |
GNOME Evolution | =2.3.6 | |
GNOME Evolution | =1.11 | |
GNOME Evolution | =1.5 | |
GNOME Evolution | =1.2.4 | |
GNOME Evolution | =1.4.5 | |
GNOME Evolution | =1.4.6 | |
GNOME Evolution | =2.0.2 | |
GNOME Evolution | =2.12.3 | |
GNOME Evolution | =2.3.5 | |
GNOME Evolution | =1.4.4 | |
GNOME Evolution | =2.24.5 | |
GNOME Evolution | =2.26.1 | |
GNOME Evolution | =1.2.1 | |
GNOME Evolution | =2.3.2 | |
GNOME Evolution | =2.2 | |
GNOME Evolution | =2.6 | |
GNOME Evolution | =1.0.8 | |
GNOME Evolution | =2.22.1 | |
GNOME Evolution | <=3.0.3 | |
GNOME Evolution | =2.32.3 | |
GNOME Evolution | =2.26.3 | |
GNOME Evolution | =2.8.1 | |
GNOME Evolution | =2.12 | |
GNOME Evolution | =2.1 | |
GNOME Evolution | =1.4.3 | |
GNOME Evolution | =2.3.6.1 | |
GNOME Evolution | =1.2.2 | |
GNOME Evolution | =2.10.3 | |
GNOME Evolution | =2.28.3.1 | |
GNOME Evolution | =2.22.3 | |
GNOME Evolution | =2.3.1 | |
GNOME Evolution | =2.4.2.1 | |
GNOME Evolution | =2.24 | |
GNOME Evolution | =1.4 | |
GNOME Evolution | =2.30.3 | |
GNOME Evolution | =2.0.0 | |
GNOME Evolution | =2.3.7 | |
GNOME Evolution | =2.3.3 | |
GNOME Evolution | =1.2 | |
GNOME Evolution | =2.3.4 | |
GNOME Evolution | =2.0 | |
GNOME Evolution | =1.2.3 | |
GNOME Evolution | =2.2.1 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3201 is considered to be of medium severity due to its potential to allow unauthorized access to arbitrary files.
The recommended fix for CVE-2011-3201 is to upgrade to GNOME Evolution version 3.2.3 or later.
CVE-2011-3201 affects multiple versions of GNOME Evolution prior to 3.2.3.
Exploitation of CVE-2011-3201 requires user interaction to trigger the file reading via a mailto: URL.
CVE-2011-3201 affects GNOME Evolution on various platforms, including Oracle Solaris and Red Hat Enterprise Linux.