Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8wv6-gwv3-gfpm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

EPSS

Процентиль: 73%
0.00786
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

nvd
больше 19 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.

debian
больше 19 лет назад

Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if s ...

EPSS

Процентиль: 73%
0.00786
Низкий