diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4e7587bb300e..ea3f3d93c93b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + evolution -- arbitrary code execution vulnerability + + + evolution + 2.0.3_1 + + + + +

Martin Joey Schulze reports:

+
+

Max Vozeler discovered an integer overflow in the helper + application camel-lock-helper which runs setuid root or + setgid mail inside of Evolution, a free groupware suite. + A local attacker can cause the setuid root helper to + execute arbitrary code with elevated privileges via a + malicious POP server.

+
+ +
+ + CAN-2005-0102 + http://cvs.gnome.org/viewcvs/evolution/camel/camel-lock-helper.c?rev=1.7&view=log#rev1.5.74.1 + + + 2005-01-20 + 2005-01-25 + +
+ mod_dosevasive -- insecure temporary file creation