Описание
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | |
edgy | not-affected | |
feisty | not-affected | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.6.1-0ubuntu7.1 |
edgy | ignored | end of life, was needed |
feisty | ignored | end of life, was needed |
upstream | needs-triage |
Показывать по
7.2 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier a ...
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
7.2 High
CVSS2
9.8 Critical
CVSS3