This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated evolution packages that fix various bugs are now available.
This update has been rated as having low security impact by the Red
Hat Security Response Team.
Evolution is the GNOME collection of personal information management
(PIM) tools. Evolution includes a mailer, calendar, contact manager,
and communication facility. The tools which make up Evolution are
tightly integrated with one another and act as a seamless personal
information management tool.
A bug was found in Evolution's helper program camel-lock-helper. This
bug could allow a local attacker to gain root privileges if
camel-lock-helper has been built to execute with elevated privileges.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0102 to this issue. On Red Hat Enterprise
Linux, camel-lock-helper is not built to execute with elevated
privileges by default. Please note however that if users have rebuilt
Evolution from the source RPM, as the root user, camel-lock-helper may
be given elevated privileges.
Additionally, these updated packages address the following issues :
-- If evolution ran during a GNOME session, the evolution-wombat
process did not exit when the user logged out of the desktop.
-- For folders marked for Offline Synchronization: if a user moved a
message from a Local Folder to an IMAP folder while in Offline mode,
the message was not present in either folder after returning to Online
This update fixes this problem. Email messages that have been lost
this way may still be present in the following path :
If this bug has affected you it may be possible to recover data by
examining the contents of this directory.
All users of evolution should upgrade to these updated packages, which
resolve these issues.
See also :
Update the affected evolution and / or evolution-devel packages.
Risk factor :
High / CVSS Base Score : 7.2
Family: Red Hat Local Security Checks
Nessus Plugin ID: 18311 ()
CVE ID: CVE-2005-0102
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.