RHEL 4 / 5 : evolution (RHSA-2008:0177)

medium Nessus Plugin ID 31389

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated evolution packages that fix a format string bug are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

Evolution is the GNOME collection of personal information management (PIM) tools.

A format string flaw was found in the way Evolution displayed encrypted mail content. If a user opened a carefully crafted mail message, arbitrary code could be executed as the user running Evolution. (CVE-2008-0072)

All users of Evolution should upgrade to these updated packages, which contain a backported patch which resolves this issue.

Red Hat would like to thank Ulf Harnhammar of Secunia Research for finding and reporting this issue.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2008-0072

https://access.redhat.com/errata/RHSA-2008:0177

Plugin Details

Severity: Medium

ID: 31389

File Name: redhat-RHSA-2008-0177.nasl

Version: 1.27

Type: local

Agent: unix

Published: 3/7/2008

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:evolution, p-cpe:/a:redhat:enterprise_linux:evolution-devel, p-cpe:/a:redhat:enterprise_linux:evolution28, p-cpe:/a:redhat:enterprise_linux:evolution28-devel, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.6, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/5/2008

Vulnerability Publication Date: 3/5/2008

Reference Information

CVE: CVE-2008-0072

BID: 28102

CWE: 134

RHSA: 2008:0177