[Secure-testing-team] Bug#484639: Two buffer overflows in evolution

Steffen Joeris steffen.joeris at skolelinux.de
Thu Jun 5 09:18:43 UTC 2008


Package: evolution
Version: 2.22.2-1
Severity: grave
Tags: security, patch
Justification: user security hole

Hi

The following CVEs[0][1] have been issued against evolution.

CVE-2008-1108:

The vulnerability is caused due to a boundary error when parsing
timezone strings contained within iCalendar attachments. This can be
exploited to overflow a static buffer via an overly long timezone
string.

Successful exploitation allows execution of arbitrary code, but
requires that the ITip Formatter plugin is disabled.


CVE-2008-2119:

The vulnerability is caused due to a boundary error when replying to
an iCalendar request while in calendar view. This can be exploited to
cause a heap-based buffer overflow via an overly long "DESCRIPTION"
property included in an iCalendar attachment.

Successful exploitation allows execution of arbitrary code, but
requires that the user accepts the iCalendar request and replies
to it from the "Calendars" window.

The gentoo bugreport can be found here[2] together with patches[3][4].


Please mention the CVE ids in your changelog, when you fix the issues.

Cheers
Steffen

[0]: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1108

[1]: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1109

[2]: http://bugs.gentoo.org/show_bug.cgi?id=223963

[3]: http://bugs.gentoo.org/attachment.cgi?id=154593

[4]: http://bugs.gentoo.org/attachment.cgi?id=154595





More information about the Secure-testing-team mailing list