Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
References
Configurations
History
No history.
Information
Published : 2005-01-24 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2005-0102
Mitre link : CVE-2005-0102
CVE.ORG link : CVE-2005-0102
JSON object : View
Products Affected
gnome
- evolution
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound