Oracle Linux 3 : evolution (ELSA-2009-0358)

This script is Copyright (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Oracle Linux host is missing one or more security updates.

Description :

From Red Hat Security Advisory 2009:0358 :

Updated evolution packages that fixes multiple security issues are now
available for Red Hat Enterprise Linux 3.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Evolution is the integrated collection of e-mail, calendaring, contact
management, communications, and personal information management (PIM)
tools for the GNOME desktop environment.

It was discovered that evolution did not properly validate NTLM (NT
LAN Manager) authentication challenge packets. A malicious server
using NTLM authentication could cause evolution to disclose portions
of its memory or crash during user authentication. (CVE-2009-0582)

An integer overflow flaw which could cause heap-based buffer overflow
was found in the Base64 encoding routine used by evolution. This could
cause evolution to crash, or, possibly, execute an arbitrary code when
large untrusted data blocks were Base64-encoded. (CVE-2009-0587)

All users of evolution are advised to upgrade to these updated
packages, which contain backported patches to correct these issues.
All running instances of evolution must be restarted for the update to
take effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2009-March/000913.html

Solution :

Update the affected evolution packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Oracle Linux Local Security Checks

Nessus Plugin ID: 67827 ()

Bugtraq ID: 34100
34109

CVE ID: CVE-2009-0582
CVE-2009-0587