RHEL 3 : evolution (RHSA-2009:0358)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated evolution packages that fixes multiple security issues are now
available for Red Hat Enterprise Linux 3.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Evolution is the integrated collection of e-mail, calendaring, contact
management, communications, and personal information management (PIM)
tools for the GNOME desktop environment.

It was discovered that evolution did not properly validate NTLM (NT
LAN Manager) authentication challenge packets. A malicious server
using NTLM authentication could cause evolution to disclose portions
of its memory or crash during user authentication. (CVE-2009-0582)

An integer overflow flaw which could cause heap-based buffer overflow
was found in the Base64 encoding routine used by evolution. This could
cause evolution to crash, or, possibly, execute an arbitrary code when
large untrusted data blocks were Base64-encoded. (CVE-2009-0587)

All users of evolution are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.
All running instances of evolution must be restarted for the update to
take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2009-0582.html
https://www.redhat.com/security/data/cve/CVE-2009-0587.html
http://rhn.redhat.com/errata/RHSA-2009-0358.html

Solution :

Update the affected evolution and / or evolution-devel packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 35947 ()

Bugtraq ID: 34100
34109

CVE ID: CVE-2009-0582
CVE-2009-0587