CVE-2005-0102

Current Description

Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.

Basic Data

PublishedJanuary 24, 2005
Last ModifiedOctober 03, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationXimianEvolution1.2.2*******
    2.3ApplicationXimianEvolution1.2.3*******
    2.3ApplicationXimianEvolution1.2.4*******
    2.3ApplicationXimianEvolution1.3.2_beta*******

Vulnerable Software List

VendorProductVersions
Ximian Evolution 1.2.2, 1.2.3, 1.2.4, 1.3.2_beta

References

NameSourceURLTags
CLA-2005:925http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000925CONECTIVAPatch Vendor Advisory
13830http://secunia.com/advisories/13830SECUNIA
GLSA-200501-35http://security.gentoo.org/glsa/glsa-200501-35.xmlGENTOOPatch Vendor Advisory
1012981http://securitytracker.com/id?1012981SECTRACK
DSA-673http://www.debian.org/security/2005/dsa-673DEBIANPatch Vendor Advisory
MDKSA-2005:024http://www.mandriva.com/security/advisories?name=MDKSA-2005:024MANDRAKE
RHSA-2005:238http://www.redhat.com/support/errata/RHSA-2005-238.htmlREDHAT
RHSA-2005:397http://www.redhat.com/support/errata/RHSA-2005-397.htmlREDHATPatch Vendor Advisory
12354http://www.securityfocus.com/bid/12354BIDPatch Vendor Advisory
evolution-camellockhelper-bo(19031)https://exchange.xforce.ibmcloud.com/vulnerabilities/19031XF
oval:org.mitre.oval:def:9616https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9616OVAL
USN-69-1https://usn.ubuntu.com/69-1/UBUNTU