9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.4%
CentOS Errata and Security Advisory CESA-2005:397
Evolution is a GNOME-based collection of personal information management
(PIM) tools.
A bug was found in the way Evolution displays mail messages. It is possible
that an attacker could create a specially crafted mail message that when
opened by a victim causes Evolution to stop responding. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0806 to this issue.
A bug was also found in Evolution’s helper program camel-lock-helper. This
bug could allow a local attacker to gain root privileges if
camel-lock-helper has been built to execute with elevated privileges. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2005-0102 to this issue. On Red Hat Enterprise Linux,
camel-lock-helper is not built to execute with elevated privileges by
default. Please note however that if users have rebuilt Evolution from the
source RPM, as the root user, camel-lock-helper may be given elevated
privileges.
All users of evolution should upgrade to these updated packages, which
include backported fixes to correct these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-May/073794.html
https://lists.centos.org/pipermail/centos-announce/2005-May/073796.html
Affected packages:
evolution
evolution-devel
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:397
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 4 | ia64 | evolution | < 2.0.2-16 | evolution-2.0.2-16.ia64.rpm |
CentOS | 4 | ia64 | evolution-devel | < 2.0.2-16 | evolution-devel-2.0.2-16.ia64.rpm |
CentOS | 4 | i386 | evolution | < 2.0.2-16 | evolution-2.0.2-16.i386.rpm |
CentOS | 4 | i386 | evolution-devel | < 2.0.2-16 | evolution-devel-2.0.2-16.i386.rpm |
CentOS | 4 | x86_64 | evolution | < 2.0.2-16 | evolution-2.0.2-16.x86_64.rpm |
CentOS | 4 | x86_64 | evolution-devel | < 2.0.2-16 | evolution-devel-2.0.2-16.x86_64.rpm |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.014 Low
EPSS
Percentile
86.4%