blob: 82135bc39f70e814db4053a7c29ae241fbc32c9c [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200711-04">
<title>Evolution: User-assisted remote execution of arbitrary code</title>
The IMAP client of Evolution contains a vulnerability potentially leading
to the execution of arbitrary code.
<product type="ebuild">evolution-data-server</product>
<announced>November 06, 2007</announced>
<revised>November 06, 2007: 01</revised>
<package name="gnome-extra/evolution-data-server" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
Evolution is the mail client of the GNOME desktop environment. Camel is
the Evolution Data Server module that handles mail functions.
The imap_rescan() function of the file camel-imap-folder.c does not
properly sanitize the "SEQUENCE" response sent by an IMAP server before
being used to index arrays.
<impact type="normal">
A malicious or compromised IMAP server could trigger the vulnerability
and execute arbitrary code with the permissions of the user running
There is no known workaround at this time.
Note that this GLSA addresses the same issue as GLSA 200707-03, but for
the 1.10 branch of Evolution Data Server.
All Evolution users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=gnome-extra/evolution-data-server-;</code>
<uri link="/security/en/glsa/glsa-200707-03.xml">GLSA 200707-03</uri>
<uri link="">CVE-2007-3257</uri>
<metadata tag="requester" timestamp="Mon, 17 Sep 2007 21:12:59 +0000">
<metadata tag="bugReady" timestamp="Mon, 17 Sep 2007 21:13:37 +0000">
<metadata tag="submitter" timestamp="Sun, 07 Oct 2007 19:29:33 +0000">