Search

published date: January 24, 2005

CVE-2005-0102 : Integer Overflow Vulnerability

Description

Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.

Product(s):

  • GNOME Evolution
  • Gnome Evolution
  • GNOME Evolution 0.0.2
  • GNOME Evolution 0.0.3
  • GNOME Evolution 0.0.4
  • GNOME Evolution 0.0.5

Question to Ask Vendors:

  1. Can you confirm whether your systems are affected by CVE-2005-0102, and if so, what steps are you currently taking to mitigate this vulnerability?
  2. What is your estimated timeline for fully resolving CVE-2005-0102 in your products or services, and how will you communicate updates on this issue to us as your customer?

READY TO GET RESULTS YOU CAN TRUST?