Red Hat Bugzilla – Bug 152903
CAN-2005-0102 evolution integer overflow
Last modified: 2007-08-30 16:04:13 EDT
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows
local users or remote malicious POP3 servers to execute arbitrary code via a
length value of -1, which leads to a zero byte memory allocation and a buffer
------- Bug moved to this database by email@example.com 2005-03-30 18:31 -------
This bug previously known as bug 2427 at https://bugzilla.fedora.us/
Originally filed under the Fedora Legacy product and Package request component.
Unknown priority P2. Setting to default priority "normal".
Unknown platform PC. Setting to default platform "All".
Setting qa contact to the default for this product.
This bug either had no qa contact or an invalid one.
05.32.11 CVE: CAN-2005-2549, CAN-2005-2550
Title: GNOME Evolution Multiple Format String Vulnerabilities
Description: GNOME Evolution is an email client for the GNOME desktop.
Evolution is affected by multiple format string vulnerabilities.
Evolution versions 126.96.36.199 and earlier are known to be vulnerable.
Fedora Legacy project has ended. These will not be fixed by Fedora Legacy.