CentOS 3 / 4 : Evolution (CESA-2005:267)

high Nessus Plugin ID 21922

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated evolution packages that fix a format string issue are now available.

This update has been rated as having important security impact by the Red Hat Security Response Team.

Evolution is the GNOME collection of personal information management (PIM) tools.

A format string bug was found in Evolution. If a user tries to save a carefully crafted meeting or appointment, arbitrary code may be executed as the user running Evolution. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2550 to this issue.

Additionally, several other format string bugs were found in Evolution. If a user views a malicious vCard, connects to a malicious LDAP server, or displays a task list from a malicious remote server, arbitrary code may be executed as the user running Evolution. The Common Vulnerabilities and Exposures project has assigned the name CVE-2005-2549 to this issue. Please note that this issue only affects Red Hat Enterprise Linux 4.

All users of Evolution should upgrade to these updated packages, which contain a backported patch which resolves this issue.

Solution

Update the affected evolution packages.

See Also

http://www.nessus.org/u?27c28042

http://www.nessus.org/u?fc73aae8

http://www.nessus.org/u?a728891d

http://www.nessus.org/u?7629abb7

http://www.nessus.org/u?e04f3467

http://www.nessus.org/u?7760948b

Plugin Details

Severity: High

ID: 21922

File Name: centos_RHSA-2005-267.nasl

Version: 1.19

Type: local

Agent: unix

Published: 7/5/2006

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:evolution, p-cpe:/a:centos:centos:evolution-devel, cpe:/o:centos:centos:3, cpe:/o:centos:centos:4

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/29/2005

Vulnerability Publication Date: 8/12/2005

Reference Information

CVE: CVE-2005-2549, CVE-2005-2550

BID: 14532

RHSA: 2005:267