{"vuid":"VU#512491","idnumber":"512491","name":"GNOME Evolution format string vulnerability","keywords":["Gnome","Evolution","format string vulnerability","encrypted mail messages","FIO30-C"],"overview":"The GNOME Evolution mail client contains a format string vulnerability that may allow an attacker to execute code.","clean_desc":"Evolution is the default mail client for the GNOME desktop environment. Evolution supports both GPG and S/MIME mail encryption. From Secunia Advisory SA29057: A format string error in the \"emf_multipart_encrypted()\" function in mail/em-format.c when displaying data (e.g. the \"Version:\" field) from an encrypted e-mail message can be exploited to execute arbitrary code via a specially crafted e-mail message. Successful exploitation requires that the user selects a malicious e-mail message.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause Evolution to crash.","resolution":"Upgrade\nThe Evolution team has released a patch to address this issue. See GNOME Bug 520745 for more information. Users and administrators who do not compile Evolution from source should obtain fixed software from their operating system vendor.","workarounds":"","sysaffected":"","thanks":"This vulnerability was made public by Ulf Harnhammar of Secunia Research.","author":"This document was written by Ryan Giobbi.","public":["http://bugzilla.gnome.org/show_bug.cgi?id=520745","http://secunia.com/advisories/29057/","http://secunia.com/secunia_research/2008-8/advisory/","http://bugzilla.gnome.org/attachment.cgi?id=106681&action=view","https://www.securecoding.cert.org/confluence/x/WwE"],"cveids":["CVE-2008-0072"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-03-05T15:14:10Z","publicdate":"2008-03-05T00:00:00Z","datefirstpublished":"2008-03-07T14:19:54Z","dateupdated":"2008-03-07T14:46:58Z","revision":23,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"1","cam_impact":"10","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.8","cam_scorecurrentwidelyknown":"1.8","cam_scorecurrentwidelyknownexploited":"3.3","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.8,"vulnote":null}