|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-397: evolution Vulnerability Assessment Details
|
RHSA-2005-397: evolution |
||
Check for the version of the evolution packages Detailed Explanation for this Vulnerability Assessment Updated evolution packages that fix various security issues are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Evolution is a GNOME-based collection of personal information management (PIM) tools. A bug was found in the way Evolution displays mail messages. It is possible that a possible hacker could create a specially crafted mail message that when opened by a victim causes Evolution to stop responding. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0806 to this issue. A bug was also found in Evolution's helper program camel-lock-helper. This bug could permit a local attacker to gain root rights if camel-lock-helper has been built to execute with elevated rights. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0102 to this issue. On Red Hat Enterprise Linux, camel-lock-helper is not built to execute with elevated rights by default. Please note however that if users have rebuilt Evolution from the source RPM, as the root user, camel-lock-helper may be given elevated rights. All users of evolution should upgrade to these updated packages, which include backported fixes to correct these issues. Solution : http://rhn.redhat.com/errata/RHSA-2005-397.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
HPGYT DELL 960GB SATA 6Gb/s 2.5in Internal SSD 0HPGYT MTFDDAK960TCB
$59.00
1TB Samsung 840 EVO Internal 2.5" SATA III SSD MZ7TE1T0HMHP Solid State Drive
$69.83
SM883 HXM7404Q 2.5 Samsung 960GB SATA6.0Gbps MZ7KH960HAJR-00005 MZ-7KH9600 SSD
$95.00
Crucial P3 Plus 500GB 1TB 2TB M.2 SSD PCIe 4.0 NVMe Internal Solid State Drive
$52.99
Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot
$14.99
Micron 5100 MAX 120GB SATA 6Gb/s 2.5" Internal SSD MTFDDAK120TCC Solid State
$9.99
Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot
$13.99
400GB SATA SSD SSDSC2BA400G3 Intel 2.5" Enterprise SSD Drive DC S3700 6Gbps
$17.10
Fanxiang 4TB 2TB 1TB SSD 550MB/s 2.5'' SATA III Internal Solid State Drive lot
$209.99
Fanxiang SSD 512GB 1TB 2TB 4TB 2.5'' SSD SATA III Internal Solid State Drive lot
$198.99
|
||
No Discussions have been posted on this vulnerability. |