DescriptionInteger overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SR:2005:003, published Wednesday, Feb 4th 2005 15:00 MEST
SUSE Timeline for this CVECVE page created: Fri Jun 28 00:56:19 2013
CVE page last modified: Fri Dec 8 16:11:17 2023