How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
It was discovered that evolution did not properly validate NTLM (NT
LAN Manager) authentication challenge packets. A malicious server
using NTLM authentication could cause evolution to disclose portions
of its memory or crash during user authentication. (CVE-2009-0582)
An integer overflow flaw which could cause heap-based buffer overflow
was found in the Base64 encoding routine used by evolution. This could
cause evolution to crash, or, possibly, execute an arbitrary code when
large untrusted data blocks were Base64-encoded. (CVE-2009-0587)
All running instances of evolution must be restarted for the update to
See also :
Update the affected evolution and / or evolution-devel packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60546 ()
CVE ID: CVE-2009-0582CVE-2009-0587
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.