![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55180 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2005:267 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory RHSA-2005:267. Evolution is the GNOME collection of personal information management (PIM) tools. A format string bug was found in Evolution. If a user tries to save a carefully crafted meeting or appointment, arbitrary code may be executed as the user running Evolution. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2550 to this issue. Additionally, several other format string bugs were found in Evolution. If a user views a malicious vCard, connects to a malicious LDAP server, or displays a task list from a malicious remote server, arbitrary code may be executed as the user running Evolution. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2549 to this issue. Please note that this issue only affects Red Hat Enterprise Linux 4. All users of Evolution should upgrade to these updated packages, which contain a backported patch which resolves this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2005-267.html Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-2549 14532 http://www.securityfocus.com/bid/14532 16394 http://secunia.com/advisories/16394 19380 http://secunia.com/advisories/19380 20050810 Evolution multiple remote format string bugs http://marc.info/?l=full-disclosure&m=112368237712032&w=2 http://www.securityfocus.com/archive/1/407789 DSA-1016 http://www.debian.org/security/2006/dsa-1016 FEDORA-2005-743 http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html MDKSA-2005:141 http://www.mandriva.com/security/advisories?name=MDKSA-2005:141 RHSA-2005:267 http://www.redhat.com/support/errata/RHSA-2005-267.html SUSE-SA:2005:054 http://www.novell.com/linux/security/advisories/2005_54_evolution.html USN-166-1 https://usn.ubuntu.com/166-1/ http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html oval:org.mitre.oval:def:9553 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553 Common Vulnerability Exposure (CVE) ID: CVE-2005-2550 oval:org.mitre.oval:def:10880 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10880 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |