blob: ef7931865b2cf414b8d2a27f4dd799702368da75 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200706-02">
<title>Evolution: User-assisted execution of arbitrary code</title>
A vulnerability has been discovered in Evolution allowing for the execution
of arbitrary code.
<product type="ebuild">evolution</product>
<announced>June 06, 2007</announced>
<revised>June 06, 2007: 01</revised>
<package name="mail-client/evolution" auto="yes" arch="*">
<unaffected range="ge">2.8.3-r2</unaffected>
<vulnerable range="lt">2.8.3-r2</vulnerable>
Evolution is the mail client of the GNOME desktop environment.
Ulf Harnhammar from Secunia Research has discovered a format string
error in the write_html() function in the file
<impact type="normal">
A remote attacker could entice a user to open a specially crafted
shared memo, possibly resulting in the execution of arbitrary code with
the privileges of the user running Evolution.
There is no known workaround at this time.
All Evolution users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=mail-client/evolution-2.8.3-r2&quot;</code>
<uri link="">CVE-2007-1002</uri>
<metadata tag="requester" timestamp="Sat, 02 Jun 2007 07:29:21 +0000">
<metadata tag="submitter" timestamp="Sun, 03 Jun 2007 18:06:03 +0000">
<metadata tag="bugReady" timestamp="Wed, 06 Jun 2007 20:42:46 +0000">