Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
https://exchange.xforce.ibmcloud.com/vulnerabilities/19031
http://www.mandriva.com/security/advisories?name=MDKSA-2005:024
http://www.debian.org/security/2005/dsa-673
http://security.gentoo.org/glsa/glsa-200501-35.xml
Source: Mitre, NVD
Published: 2005-01-24
Updated: 2025-04-03
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00599