Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the evolution packages
Detailed Explanation for this Vulnerability Assessment
Updated evolution packages that fix various bugs are now available.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Evolution is the GNOME collection of personal information management (PIM)
tools. Evolution includes a mailer, calendar, contact manager, and
communication facility. The tools which make up Evolution are tightly
integrated with one another and act as a seamless personal information
A bug was found in Evolution's helper program camel-lock-helper. This
bug could permit a local attacker to gain root rights if
camel-lock-helper has been built to execute with elevated rights. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-0102 to this issue. On Red Hat Enterprise Linux,
camel-lock-helper is not built to execute with elevated rights by
default. Please note however that if users have rebuilt Evolution from the
source RPM, as the root user, camel-lock-helper may be given elevated
Additionally, these updated packages address the following issues:
-- If evolution ran during a GNOME session, the evolution-wombat process
did not exit when the user logged out of the desktop.
-- For folders marked for Offline Synchronization: if a user moved a
message from a Local Folder to an IMAP folder while in
Offline mode, the message was not present in either folder after
returning to Online mode.
This update fixes this problem. Email messages that have been lost
this way may still be present in the following path:
If this bug has affected you it may be possible to recover data by
examining the contents of this directory.
All users of evolution should upgrade to these updated packages, which
resolve these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-238.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|Lenovo ThinkPad Laptop.T520 i5-2520M 8GB 256GB SSD 15.6 Cam Batt AC Win10 Office
|65W 45W AC Charger Fit For Lenovo Thinkpad Yoga 260 11 11S 12 14 15 370 460 S1 I
|Lenovo ThinkPad X1 Carbon (2nd Gen) i5-4300U 1.9GHz | 4GB RAM | 256GB SSD
|Lenovo IdeaCentre A340-24ICK 23.8" All-In-One Desktop Intel Core i3-9100T 256GB
No Discussions have been posted on this vulnerability.