blob: 83722a5ec0a60d9c2c88126b2b08d521e7a8cb11 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200501-35">
<title>Evolution: Integer overflow in camel-lock-helper</title>
An overflow in the camel-lock-helper application can be exploited by an
attacker to execute arbitrary code with elevated privileges.
<product type="ebuild">evolution</product>
<announced>January 24, 2005</announced>
<revised>January 24, 2005: 01</revised>
<access>local and remote</access>
<package name="mail-client/evolution" auto="yes" arch="*">
<unaffected range="ge">2.0.2-r1</unaffected>
<vulnerable range="le">2.0.2</vulnerable>
Evolution is a GNOME groupware application similar to Microsoft
Max Vozeler discovered an integer overflow in the
camel-lock-helper application, which is installed as setgid mail by
<impact type="high">
A local attacker could exploit this vulnerability to execute
malicious code with the privileges of the 'mail' group. A remote
attacker could also setup a malicious POP server to execute arbitrary
code when an Evolution user connects to it.
There is no known workaround at this time.
All Evolution users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.0.2-r1&quot;</code>
<uri link="">CAN-2005-0102</uri>
<metadata tag="submitter" timestamp="Mon, 24 Jan 2005 14:31:03 +0000">
<metadata tag="bugReady" timestamp="Mon, 24 Jan 2005 21:37:19 +0000">