Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2006:057: cairo Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the cairo package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2006:057 (cairo).
GNOME Evolution allows remote attackers to cause a denial of service
(persistent client crash) via an attached text file that contains
'Content-Disposition: inline' in the header, and a very long line in the body,
which causes the client to repeatedly crash until the e-mail message is
manually removed, possibly due to a buffer overflow, as demonstrated using an
XML attachment. The underlying issue is in libcairo, which is used by recent
versions of Evolution for message rendering. The Corporate Desktop 3.0 version
of Evolution does not use libcairo and is not vulnerable to this issue. Updated
packages have been patched to correct these issues.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:057
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.