Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the evolution packages
Detailed Explanation for this Vulnerability Assessment
Updated evolution packages that fix various bugs are now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Evolution is the GNOME collection of personal information management (PIM)
tools. Evolution includes a mailer, calendar, contact manager, and
communication facility. The tools which make up Evolution are tightly
integrated with one another and act as a seamless personal information
A bug was found in Evolution's helper program camel-lock-helper. This
bug could permit a local attacker to gain root rights if
camel-lock-helper has been built to execute with elevated rights. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-0102 to this issue. On Red Hat Enterprise Linux,
camel-lock-helper is not built to execute with elevated rights by
default. Please note however that if users have rebuilt Evolution from the
source RPM, as the root user, camel-lock-helper may be given elevated
Additionally, these updated packages address the following issues:
-- If evolution ran during a GNOME session, the evolution-wombat process
did not exit when the user logged out of the desktop.
-- For folders marked for Offline Synchronization: if a user moved a
message from a Local Folder to an IMAP folder while in
Offline mode, the message was not present in either folder after
returning to Online mode.
This update fixes this problem. Email messages that have been lost
this way may still be present in the following path:
If this bug has affected you it may be possible to recover data by
examining the contents of this directory.
All users of evolution should upgrade to these updated packages, which
resolve these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-238.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|128GB (4x32GB) DDR4 2133L PC4-17000L HP Blade WS460c G9 Memory RAM Upgrade 4Rx4
|New Transcend TS512MSK64V3N Memory DDR3 1333 MHz 4 GB.
|128GB (4x32GB) DDR4 2133L PC4-17000L HP Blade BL660C G9 Memory RAM Upgrade 4Rx4
|Samsung (1x8GB) 2Rx4 PC3-10600R ECC DRR3 Server Memory - M393B1K70BH1-CH9
No Discussions have been posted on this vulnerability.