Mandrake Linux Security Advisory : cairo (MDKSA-2006:057)

Medium Nessus Plugin ID 21115


The remote Mandrake Linux host is missing one or more security updates.


GNOME Evolution allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains 'Content-Disposition: inline' in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.

The underlying issue is in libcairo, which is used by recent versions of Evolution for message rendering.

The Corporate Desktop 3.0 version of Evolution does not use libcairo and is not vulnerable to this issue.

Updated packages have been patched to correct these issues.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 21115

File Name: mandrake_MDKSA-2006-057.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2006/03/21

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64cairo2, p-cpe:/a:mandriva:linux:lib64cairo2-devel, p-cpe:/a:mandriva:linux:lib64cairo2-static-devel, p-cpe:/a:mandriva:linux:libcairo2, p-cpe:/a:mandriva:linux:libcairo2-devel, p-cpe:/a:mandriva:linux:libcairo2-static-devel, cpe:/o:mandriva:linux:2006

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2006/03/20

Reference Information

CVE: CVE-2006-0528

MDKSA: 2006:057