Denial of Service (DoS) Affecting evolution package, versions [2.3.1,2.3.7]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
17.1% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-EVOLUTION-2370020
  • published26 Jan 2022
  • disclosed2 Feb 2006
  • creditUnknown

Introduced: 2 Feb 2006

CVE-2006-0528  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

There is no fixed version for evolution.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.

References

CVSS Scores

version 3.1