Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58446
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1325-1)
Summary:The remote host is missing an update for the Debian 'evolution' package(s) announced via the DSA-1325-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'evolution' package(s) announced via the DSA-1325-1 advisory.

Vulnerability Insight:
Several remote vulnerabilities have been discovered in Evolution, a groupware suite with mail client and organizer. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-1002

Ulf Harnhammar discovered that a format string vulnerability in the handling of shared calendars may allow the execution of arbitrary code.

CVE-2007-3257

It was discovered that the IMAP code in the Evolution Data Server performs insufficient sanitising of a value later used an array index, which can lead to the execution of arbitrary code.

For the oldstable distribution (sarge) these problems have been fixed in version 2.0.4-2sarge2. Packages for hppa, mips and powerpc are not yet available. They will be provided later.

For the stable distribution (etch) these problems have been fixed in version 2.6.3-6etch1. Packages for mips are not yet available. They will be provided later.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you upgrade your evolution packages.

Affected Software/OS:
'evolution' package(s) on Debian 3.1, Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1002
BugTraq ID: 23073
http://www.securityfocus.com/bid/23073
Bugtraq: 20070321 Secunia Research: Evolution Shared Memo Categories Format StringVulnerability (Google Search)
http://www.securityfocus.com/archive/1/463406/100/0/threaded
Bugtraq: 20070405 FLEA-2007-0010-1: evolution (Google Search)
http://www.securityfocus.com/archive/1/464820/30/7170/threaded
Debian Security Information: DSA-1325 (Google Search)
http://www.debian.org/security/2007/dsa-1325
http://security.gentoo.org/glsa/glsa-200706-02.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:070
http://secunia.com/secunia_research/2007-44/advisory/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10100
RedHat Security Advisories: RHSA-2007:0158
https://rhn.redhat.com/errata/RHSA-2007-0158.html
http://www.securitytracker.com/id?1017808
http://secunia.com/advisories/24234
http://secunia.com/advisories/24651
http://secunia.com/advisories/24668
http://secunia.com/advisories/25102
http://secunia.com/advisories/25551
http://secunia.com/advisories/25880
SuSE Security Announcement: SUSE-SR:2007:015 (Google Search)
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.ubuntu.com/usn/usn-442-1
http://www.vupen.com/english/advisories/2007/1058
XForce ISS Database: evolution-writehtml-format-string(33106)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33106
Common Vulnerability Exposure (CVE) ID: CVE-2007-3257
1018284
http://www.securitytracker.com/id?1018284
20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
20070615 rPSA-2007-0122-1 evolution-data-server
http://www.securityfocus.com/archive/1/471455/100/0/threaded
24567
http://www.securityfocus.com/bid/24567
25765
http://secunia.com/advisories/25765
25766
http://secunia.com/advisories/25766
25774
http://secunia.com/advisories/25774
25777
http://secunia.com/advisories/25777
25793
http://secunia.com/advisories/25793
25798
http://secunia.com/advisories/25798
25843
http://secunia.com/advisories/25843
25880
25894
http://secunia.com/advisories/25894
25906
http://secunia.com/advisories/25906
25958
http://secunia.com/advisories/25958
26083
http://secunia.com/advisories/26083
37489
http://osvdb.org/37489
ADV-2007-2282
http://www.vupen.com/english/advisories/2007/2282
DSA-1321
http://www.debian.org/security/2007/dsa-1321
DSA-1325
GLSA-200707-03
http://www.gentoo.org/security/en/glsa/glsa-200707-03.xml
GLSA-200711-04
http://security.gentoo.org/glsa/glsa-200711-04.xml
MDKSA-2007:136
http://www.mandriva.com/security/advisories?name=MDKSA-2007:136
RHSA-2007:0509
http://www.redhat.com/support/errata/RHSA-2007-0509.html
RHSA-2007:0510
http://www.redhat.com/support/errata/RHSA-2007-0510.html
SUSE-SA:2007:042
http://www.novell.com/linux/security/advisories/2007_42_evolution.html
SUSE-SR:2007:014
http://www.novell.com/linux/security/advisories/2007_14_sr.html
USN-475-1
http://www.ubuntu.com/usn/usn-475-1
[Evolution-hackers] 20070619 Evolution 2.11.4 , Evolution-Data-Server 1.11.4 , GtkHTML 3.15.4 and Evolution-Exchange 2.11.4 released
http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html
gnome-imaprescan-code-execution(34964)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34964
http://bugzilla.gnome.org/show_bug.cgi?id=447414
oval:org.mitre.oval:def:11724
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.