Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Evolution Data Server
Опубликовано:24 марта 2009 г.
Источник:
SecurityVulns ID:9770
Тип:клиент
Уровень опасности:
7/10
Описание:Подмена сигнатур, DoS, утечка данных из памяти процесса, целочисленные переполнения.
CVE:CVE-2009-0587 (Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.)
 CVE-2009-0582 (The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.)
 CVE-2009-0547 (Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2009:078 ] evolution-data-server (24.03.2009)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород