Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-2789

Опубликовано: 02 июн. 2006
Источник: debian
EPSS Низкий

Описание

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
evolutionfixed2.4.0-1package
evolutionnot-affectedsargepackage

Примечания

  • Verified that the patch has been applied in 2.4.0-1,

  • may have been fixed earlier.

EPSS

Процентиль: 73%
0.00786
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

nvd
больше 19 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

github
больше 3 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

EPSS

Процентиль: 73%
0.00786
Низкий