CVE-2011-3201

GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Configurations

Configuration 1 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:1.11:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.10.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.12:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.12.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.22.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.22.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.24:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.24.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.26.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.26.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.28.3.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.30.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:evolution:2.32.3:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2013-0516.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0516.html - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory
References () https://bugzilla.gnome.org/show_bug.cgi?id=657374 - Issue Tracking () https://bugzilla.gnome.org/show_bug.cgi?id=657374 - Issue Tracking
References () https://bugzilla.redhat.com/show_bug.cgi?id=733504 - Patch, Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=733504 - Issue Tracking, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/82450 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/82450 -
References () https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56 - Patch, Vendor Advisory () https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56 - Patch, Vendor Advisory
References () https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3 - Patch, Vendor Advisory () https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3 - Patch, Vendor Advisory

Information

Published : 2013-03-08 21:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3201

Mitre link : CVE-2011-3201

CVE.ORG link : CVE-2011-3201


JSON object : View

Products Affected

gnome

  • evolution

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

oracle

  • solaris
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor