CVE-2003-0130

Ximian Evolution Mail User Agent <1.2.2 - XSS

Title source: llm
STIX 2.1

Description

The handle_image function in mail-format.c for Ximian Evolution Mail User Agent 1.2.2 and earlier does not properly escape HTML characters, which allows remote attackers to inject arbitrary data and HTML via a MIME Content-ID header in a MIME-encoded image.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Core Security · textremotelinux
https://www.exploit-db.com/exploits/22371

References (9)

Core 9
Core References
Third Party Advisory vendor-advisory x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200303-18.xml
Vendor Advisory vendor-advisory x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2003:045
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A111
Exploit, Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/7119
Third Party Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0141.html
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104826470527308&w=2
Vendor Advisory vendor-advisory x_refsource_conectiva
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000648
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2003-108.html

Scores

EPSS 0.1355
EPSS Percentile 94.3%

Details

Status published
Products (10)
ximian/evolution 1.0.3
ximian/evolution 1.0.4
ximian/evolution 1.0.5
ximian/evolution 1.0.6
ximian/evolution 1.0.7
ximian/evolution 1.0.8
ximian/evolution 1.1.1
ximian/evolution 1.2
ximian/evolution 1.2.1
ximian/evolution 1.2.2
Published Mar 24, 2003
Tracked Since Feb 18, 2026