Description
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Mike Davis · textdoslinux
https://www.exploit-db.com/exploits/27145
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/16408
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/265-1/
Vendor Advisory vendor-advisory
x_refsource_suse
http://www.novell.com/linux/security/advisories/2006_07_sr.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/610
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:057
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19504
Scores
EPSS
0.0511
EPSS Percentile
89.9%
Details
Status
published
Products (8)
gnome/evolution
2.3.1
gnome/evolution
2.3.2
gnome/evolution
2.3.3
gnome/evolution
2.3.4
gnome/evolution
2.3.5
gnome/evolution
2.3.6
gnome/evolution
2.3.6.1
gnome/evolution
2.3.7
Published
Feb 02, 2006
Tracked Since
Feb 18, 2026