cve-2005-2549
Vulnerability from cvelistv5
Published
2005-08-12 04:00
Modified
2024-08-07 22:30
Severity ?
Summary
Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
References
secalert@redhat.comhttp://marc.info/?l=full-disclosure&m=112368237712032&w=2
secalert@redhat.comhttp://secunia.com/advisories/16394
secalert@redhat.comhttp://secunia.com/advisories/19380
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1016
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2005:141
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2005_54_evolution.html
secalert@redhat.comhttp://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2005-267.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/407789
secalert@redhat.comhttp://www.securityfocus.com/bid/14532
secalert@redhat.comhttp://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553
secalert@redhat.comhttps://usn.ubuntu.com/166-1/
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=112368237712032&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16394
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19380
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1016
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:141
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_54_evolution.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-267.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/407789
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14532
af854a3a-2127-422b-91ae-364da2661108http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/166-1/
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:30:01.619Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SA:2005:054",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_54_evolution.html"
          },
          {
            "name": "14532",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14532"
          },
          {
            "name": "RHSA-2005:267",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-267.html"
          },
          {
            "name": "19380",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19380"
          },
          {
            "name": "DSA-1016",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1016"
          },
          {
            "name": "FEDORA-2005-743",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html"
          },
          {
            "name": "MDKSA-2005:141",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:141"
          },
          {
            "name": "16394",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16394"
          },
          {
            "name": "oval:org.mitre.oval:def:9553",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html"
          },
          {
            "name": "20050810 Evolution multiple remote format string bugs",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/407789"
          },
          {
            "name": "20050810 Evolution multiple remote format string bugs",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=full-disclosure\u0026m=112368237712032\u0026w=2"
          },
          {
            "name": "USN-166-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/166-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "SUSE-SA:2005:054",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_54_evolution.html"
        },
        {
          "name": "14532",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14532"
        },
        {
          "name": "RHSA-2005:267",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-267.html"
        },
        {
          "name": "19380",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19380"
        },
        {
          "name": "DSA-1016",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1016"
        },
        {
          "name": "FEDORA-2005-743",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html"
        },
        {
          "name": "MDKSA-2005:141",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:141"
        },
        {
          "name": "16394",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16394"
        },
        {
          "name": "oval:org.mitre.oval:def:9553",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html"
        },
        {
          "name": "20050810 Evolution multiple remote format string bugs",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/407789"
        },
        {
          "name": "20050810 Evolution multiple remote format string bugs",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://marc.info/?l=full-disclosure\u0026m=112368237712032\u0026w=2"
        },
        {
          "name": "USN-166-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/166-1/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2005-2549",
    "datePublished": "2005-08-12T04:00:00",
    "dateReserved": "2005-08-12T00:00:00",
    "dateUpdated": "2024-08-07T22:30:01.619Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2005-2549\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2005-08-12T04:00:00.000\",\"lastModified\":\"2024-11-20T23:59:48.733\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C44773EE-24D1-49F9-8B80-DA47450251E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48282B11-CBED-4E04-984A-48D0EC579748\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0219B1ED-5EA4-44FE-A4CB-5F50670D6A6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A90124-F131-4FF2-91FA-371F54D556A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CEE0340-36EA-477D-9928-6894B53F0802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C456D757-63DC-4881-AA9E-84C13B1AE9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28A92EC-24AB-471A-9E23-DE8493B50AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2128A01C-A2AA-4E11-94D6-E361486BBFF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6337DBEC-591E-4D33-ABA0-D761237C4FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7160595D-FB7B-45F9-85BD-5767B08F4855\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=full-disclosure\u0026m=112368237712032\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/16394\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/19380\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1016\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:141\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_54_evolution.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-267.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/407789\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/14532\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://usn.ubuntu.com/166-1/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=full-disclosure\u0026m=112368237712032\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/16394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/19380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1016\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_54_evolution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-announce-list/2005-August/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-267.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/407789\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9553\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/166-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.