Bug 152903 - CAN-2005-0102 evolution integer overflow
CAN-2005-0102 evolution integer overflow
Product: Fedora Legacy
Classification: Retired
Component: evolution (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Fedora Legacy Bugs
1, LEGACY, NEEDSWORK, rh73, rh90
: Security
Depends On:
  Show dependency treegraph
Reported: 2005-02-10 14:29 EST by Marc Deslauriers
Modified: 2007-08-30 16:04 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-08-30 16:04:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description David Lawrence 2005-03-30 18:31:33 EST
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows
local users or remote malicious POP3 servers to execute arbitrary code via a
length value of -1, which leads to a zero byte memory allocation and a buffer


------- Bug moved to this database by dkl@redhat.com 2005-03-30 18:31 -------

This bug previously known as bug 2427 at https://bugzilla.fedora.us/
Originally filed under the Fedora Legacy product and Package request component.

Unknown priority P2. Setting to default priority "normal".
Unknown platform PC. Setting to default platform "All".
Setting qa contact to the default for this product.
   This bug either had no qa contact or an invalid one.

Comment 1 John Dalbec 2005-09-08 08:28:50 EDT
05.32.11 CVE: CAN-2005-2549, CAN-2005-2550
Platform: Linux
Title: GNOME Evolution Multiple Format String Vulnerabilities
Description: GNOME Evolution is an email client for the GNOME desktop.
Evolution is affected by multiple format string vulnerabilities.
Evolution versions and earlier are known to be vulnerable.
Ref: http://www.securityfocus.com/bid/14532 
Comment 2 Jesse Keating 2007-08-30 16:04:13 EDT
Fedora Legacy project has ended.  These will not be fixed by Fedora Legacy.

Note You need to log in before you can comment on or make changes to this bug.