CVE-2007-3257

Camel (camel-imap-folder.c) in the mailer component for Evolution Data Server 1.11 allows remote IMAP servers to execute arbitrary code via a negative SEQUENCE value in GData, which is used as an array index.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
http://bugzilla.gnome.org/show_bug.cgi?id=447414
http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html
http://osvdb.org/37489
http://secunia.com/advisories/25765
http://secunia.com/advisories/25766
http://secunia.com/advisories/25774
http://secunia.com/advisories/25777
http://secunia.com/advisories/25793
http://secunia.com/advisories/25798
http://secunia.com/advisories/25843
http://secunia.com/advisories/25880
http://secunia.com/advisories/25894
http://secunia.com/advisories/25906
http://secunia.com/advisories/25958
http://secunia.com/advisories/26083
http://security.gentoo.org/glsa/glsa-200711-04.xml
http://www.debian.org/security/2007/dsa-1321
http://www.debian.org/security/2007/dsa-1325
http://www.gentoo.org/security/en/glsa/glsa-200707-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:136
http://www.novell.com/linux/security/advisories/2007_14_sr.html
http://www.novell.com/linux/security/advisories/2007_42_evolution.html
http://www.redhat.com/support/errata/RHSA-2007-0509.html
http://www.redhat.com/support/errata/RHSA-2007-0510.html
http://www.securityfocus.com/archive/1/471455/100/0/threaded
http://www.securityfocus.com/bid/24567
http://www.securitytracker.com/id?1018284
http://www.ubuntu.com/usn/usn-475-1
http://www.vupen.com/english/advisories/2007/2282
https://exchange.xforce.ibmcloud.com/vulnerabilities/34964
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
http://bugzilla.gnome.org/show_bug.cgi?id=447414
http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html
http://osvdb.org/37489
http://secunia.com/advisories/25765
http://secunia.com/advisories/25766
http://secunia.com/advisories/25774
http://secunia.com/advisories/25777
http://secunia.com/advisories/25793
http://secunia.com/advisories/25798
http://secunia.com/advisories/25843
http://secunia.com/advisories/25880
http://secunia.com/advisories/25894
http://secunia.com/advisories/25906
http://secunia.com/advisories/25958
http://secunia.com/advisories/26083
http://security.gentoo.org/glsa/glsa-200711-04.xml
http://www.debian.org/security/2007/dsa-1321
http://www.debian.org/security/2007/dsa-1325
http://www.gentoo.org/security/en/glsa/glsa-200707-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:136
http://www.novell.com/linux/security/advisories/2007_14_sr.html
http://www.novell.com/linux/security/advisories/2007_42_evolution.html
http://www.redhat.com/support/errata/RHSA-2007-0509.html
http://www.redhat.com/support/errata/RHSA-2007-0510.html
http://www.securityfocus.com/archive/1/471455/100/0/threaded
http://www.securityfocus.com/bid/24567
http://www.securitytracker.com/id?1018284
http://www.ubuntu.com/usn/usn-475-1
http://www.vupen.com/english/advisories/2007/2282
https://exchange.xforce.ibmcloud.com/vulnerabilities/34964
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:evolution:1.11:*:*:*:*:*:*:*

History

21 Nov 2024, 00:32

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc - () ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc -
References () http://bugzilla.gnome.org/show_bug.cgi?id=447414 - () http://bugzilla.gnome.org/show_bug.cgi?id=447414 -
References () http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html - () http://mail.gnome.org/archives/evolution-hackers/2007-June/msg00064.html -
References () http://osvdb.org/37489 - () http://osvdb.org/37489 -
References () http://secunia.com/advisories/25765 - () http://secunia.com/advisories/25765 -
References () http://secunia.com/advisories/25766 - () http://secunia.com/advisories/25766 -
References () http://secunia.com/advisories/25774 - () http://secunia.com/advisories/25774 -
References () http://secunia.com/advisories/25777 - () http://secunia.com/advisories/25777 -
References () http://secunia.com/advisories/25793 - () http://secunia.com/advisories/25793 -
References () http://secunia.com/advisories/25798 - () http://secunia.com/advisories/25798 -
References () http://secunia.com/advisories/25843 - () http://secunia.com/advisories/25843 -
References () http://secunia.com/advisories/25880 - () http://secunia.com/advisories/25880 -
References () http://secunia.com/advisories/25894 - () http://secunia.com/advisories/25894 -
References () http://secunia.com/advisories/25906 - () http://secunia.com/advisories/25906 -
References () http://secunia.com/advisories/25958 - () http://secunia.com/advisories/25958 -
References () http://secunia.com/advisories/26083 - () http://secunia.com/advisories/26083 -
References () http://security.gentoo.org/glsa/glsa-200711-04.xml - () http://security.gentoo.org/glsa/glsa-200711-04.xml -
References () http://www.debian.org/security/2007/dsa-1321 - () http://www.debian.org/security/2007/dsa-1321 -
References () http://www.debian.org/security/2007/dsa-1325 - () http://www.debian.org/security/2007/dsa-1325 -
References () http://www.gentoo.org/security/en/glsa/glsa-200707-03.xml - () http://www.gentoo.org/security/en/glsa/glsa-200707-03.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:136 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:136 -
References () http://www.novell.com/linux/security/advisories/2007_14_sr.html - () http://www.novell.com/linux/security/advisories/2007_14_sr.html -
References () http://www.novell.com/linux/security/advisories/2007_42_evolution.html - () http://www.novell.com/linux/security/advisories/2007_42_evolution.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0509.html - () http://www.redhat.com/support/errata/RHSA-2007-0509.html -
References () http://www.redhat.com/support/errata/RHSA-2007-0510.html - () http://www.redhat.com/support/errata/RHSA-2007-0510.html -
References () http://www.securityfocus.com/archive/1/471455/100/0/threaded - () http://www.securityfocus.com/archive/1/471455/100/0/threaded -
References () http://www.securityfocus.com/bid/24567 - () http://www.securityfocus.com/bid/24567 -
References () http://www.securitytracker.com/id?1018284 - () http://www.securitytracker.com/id?1018284 -
References () http://www.ubuntu.com/usn/usn-475-1 - () http://www.ubuntu.com/usn/usn-475-1 -
References () http://www.vupen.com/english/advisories/2007/2282 - () http://www.vupen.com/english/advisories/2007/2282 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34964 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34964 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11724 -

Information

Published : 2007-06-19 16:30

Updated : 2024-11-21 00:32


NVD link : CVE-2007-3257

Mitre link : CVE-2007-3257

CVE.ORG link : CVE-2007-3257


JSON object : View

Products Affected

gnome

  • evolution