Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
Link | Tags |
---|---|
http://www.novell.com/linux/security/advisories/2005_54_evolution.html | vendor advisory |
http://www.securityfocus.com/bid/14532 | vdb entry |
http://www.redhat.com/support/errata/RHSA-2005-267.html | vendor advisory |
http://secunia.com/advisories/19380 | third party advisory |
http://www.debian.org/security/2006/dsa-1016 | vendor advisory |
http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 | vendor advisory |
http://secunia.com/advisories/16394 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553 | signature vdb entry |
http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html | |
http://www.securityfocus.com/archive/1/407789 | mailing list |
http://marc.info/?l=full-disclosure&m=112368237712032&w=2 | mailing list |
https://usn.ubuntu.com/166-1/ | vendor advisory |