RHEL 4 : evolution (RHSA-2005:397)

High Nessus Plugin ID 18197


The remote Red Hat host is missing one or more security updates.


Updated evolution packages that fix various security issues are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Evolution is a GNOME-based collection of personal information management (PIM) tools.

A bug was found in the way Evolution displays mail messages. It is possible that an attacker could create a specially crafted mail message that when opened by a victim causes Evolution to stop responding. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0806 to this issue.

A bug was also found in Evolution's helper program camel-lock-helper.
This bug could allow a local attacker to gain root privileges if camel-lock-helper has been built to execute with elevated privileges.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0102 to this issue. On Red Hat Enterprise Linux, camel-lock-helper is not built to execute with elevated privileges by default. Please note however that if users have rebuilt Evolution from the source RPM, as the root user, camel-lock-helper may be given elevated privileges.

All users of evolution should upgrade to these updated packages, which include backported fixes to correct these issues.


Update the affected evolution and / or evolution-devel packages.

See Also




Plugin Details

Severity: High

ID: 18197

File Name: redhat-RHSA-2005-397.nasl

Version: $Revision: 1.19 $

Type: local

Agent: unix

Published: 2005/05/04

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:evolution, p-cpe:/a:redhat:enterprise_linux:evolution-devel, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/05/04

Vulnerability Publication Date: 2005/01/25

Reference Information

CVE: CVE-2005-0102, CVE-2005-0806

OSVDB: 13160, 14577

RHSA: 2005:397