CVE-2006-0528

Gnome Evolution - Buffer Overflow

Title source: rule
STIX 2.1

Description

The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mike Davis · textdoslinux
https://www.exploit-db.com/exploits/27145

References (7)

Core 7
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/16408
Vendor Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/265-1/
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2006_07_sr.html
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/610
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:057
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19504

Scores

EPSS 0.0511
EPSS Percentile 89.9%

Details

Status published
Products (8)
gnome/evolution 2.3.1
gnome/evolution 2.3.2
gnome/evolution 2.3.3
gnome/evolution 2.3.4
gnome/evolution 2.3.5
gnome/evolution 2.3.6
gnome/evolution 2.3.6.1
gnome/evolution 2.3.7
Published Feb 02, 2006
Tracked Since Feb 18, 2026