Description
Ximian Evolution Mail User Agent 1.2.2 and earlier allows remote attackers to cause a denial of service (memory consumption) via a mail message that is uuencoded multiple times.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Core Security · textremotelinux
https://www.exploit-db.com/exploits/22369
References (9)
Core 9
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104826470527308&w=2
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/7118
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml
Patch, Vendor Advisory x_refsource_misc
http://www.coresecurity.com/common/showdoc.php?idx=309&idxseccion=10
Vendor Advisory vendor-advisory
x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2003:045
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A108
Vendor Advisory vendor-advisory
x_refsource_conectiva
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-108.html
Scores
EPSS
0.2022
EPSS Percentile
95.5%
Details
Status
published
Products (10)
ximian/evolution
1.0.3
ximian/evolution
1.0.4
ximian/evolution
1.0.5
ximian/evolution
1.0.6
ximian/evolution
1.0.7
ximian/evolution
1.0.8
ximian/evolution
1.1.1
ximian/evolution
1.2
ximian/evolution
1.2.1
ximian/evolution
1.2.2
Published
Mar 24, 2003
Tracked Since
Feb 18, 2026