|
Family: Ubuntu Local Security Checks --> Category: infos
USN69-1 : evolution vulnerability Vulnerability Scan
Vulnerability Scan Summary evolution vulnerability
Detailed Explanation for this Vulnerability Test
Synopsis :
These remote packages are missing security patches :
- evolution
- evolution-dev
- evolution1.5
- evolution1.5-dev
Description :
Max Vozeler discovered an integer overflow in camel-lock-helper. An
user-supplied length value was not validated, so that a value of -1
caused a buffer allocation of 0 bytes
this buffer was then filled by
an arbitrary amount of user-supplied data.
A local attacker or a malicious POP3 server could exploit this to
execute arbitrary code with root rights (because camel-lock-helper
is installed as setuid root).
Solution :
Upgrade to :
- evolution-2.0.2-0ubuntu2.1 (Ubuntu 4.10)
- evolution-dev-2.0.2-0ubuntu2.1 (Ubuntu 4.10)
- evolution1.5-2.0.2-0ubuntu2.1 (Ubuntu 4.10)
- evolution1.5-dev-2.0.2-0ubuntu2.1 (Ubuntu 4.10)
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|