Your submission was sent successfully! Close

CVE-2005-0102

Published: 24 January 2005

Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.

Priority

Unknown

Status

Package Release Status
evolution
Launchpad, Ubuntu, Debian
Upstream Needs triage

evolution-data-server
Launchpad, Ubuntu, Debian
Upstream Needs triage