blob: 25b77dbc95f444fd904e5018598d351654137840 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200707-03">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
The IMAP client of Evolution contains a vulnerability potentially leading
to the execution of arbitrary code.
<product type="ebuild">evolution-data-server</product>
<announced>July 02, 2007</announced>
<revised>July 02, 2007: 01</revised>
<package name="gnome-extra/evolution-data-server" auto="yes" arch="*">
<unaffected range="ge">1.8.3-r5</unaffected>
<unaffected range="rge">1.6.2-r1</unaffected>
<vulnerable range="lt">1.8.3-r5</vulnerable>
Evolution is the mail client of the GNOME desktop environment. Camel is
the Evolution Data Server module that handles mail functions.
The imap_rescan() function of the file camel-imap-folder.c does not
properly sanitize the "SEQUENCE" response sent by an IMAP server before
being used to index arrays.
<impact type="normal">
A malicious or compromised IMAP server could trigger the vulnerability
and execute arbitrary code with the permissions of the user running
There is no known workaround at this time.
All Evolution users should upgrade evolution-data-server to the latest
# emerge --sync
# emerge --ask --oneshot --verbose &quot;gnome-extra/evolution-data-server&quot;</code>
<uri link="">CVE-2007-3257</uri>
<metadata tag="requester" timestamp="Wed, 20 Jun 2007 15:13:37 +0000">
<metadata tag="submitter" timestamp="Mon, 25 Jun 2007 16:19:12 +0000">
<metadata tag="bugReady" timestamp="Mon, 25 Jun 2007 16:19:36 +0000">