RHEL 4 / 5 : evolution-data-server (RHSA-2009:0354)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated evolution-data-server and evolution28-evolution-data-server
packages that fix multiple security issues are now available for Red
Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Evolution Data Server provides a unified back-end for applications
which interact with contacts, task, and calendar information.
Evolution Data Server was originally developed as a back-end for
Evolution, but is now used by multiple other applications.

Evolution Data Server did not properly check the Secure/Multipurpose
Internet Mail Extensions (S/MIME) signatures used for public key
encryption and signing of e-mail messages. An attacker could use this
flaw to spoof a signature by modifying the text of the e-mail message
displayed to the user. (CVE-2009-0547)

It was discovered that Evolution Data Server did not properly validate
NTLM (NT LAN Manager) authentication challenge packets. A malicious
server using NTLM authentication could cause an application using
Evolution Data Server to disclose portions of its memory or crash
during user authentication. (CVE-2009-0582)

Multiple integer overflow flaws which could cause heap-based buffer
overflows were found in the Base64 encoding routines used by Evolution
Data Server. This could cause an application using Evolution Data
Server to crash, or, possibly, execute an arbitrary code when large
untrusted data blocks were Base64-encoded. (CVE-2009-0587)

All users of evolution-data-server and
evolution28-evolution-data-server are advised to upgrade to these
updated packages, which contain backported patches to correct these
issues. All running instances of Evolution Data Server and
applications using it (such as Evolution) must be restarted for the
update to take effect.

See also :


Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 35945 ()

Bugtraq ID: 33720

CVE ID: CVE-2009-0547

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now