Jump to content

Advisories (MDKSA-2006:057 ): cairo


aru
 Share

Recommended Posts

Mandriva Advisories MDKSA-2006:057 : cairo

 

Updated cairo packages to address Evolution DoS vulnerability

March 20th, 2006

 

GNOME Evolution allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. The underlying issue is in libcairo, which is used by recent versions of Evolution for message rendering. The Corporate Desktop 3.0 version of Evolution does not use libcairo and isnot vulnerable to this issue. Updated packages have been patched to correct these issues.

 

 

The released versions of Mandriva GNU/Linux affected are:

  • 2006.0

Full information about this advisory, including the updated packages, is available at:

wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:057

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0528

 

Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)

Link to comment
Share on other sites

 Share

×
×
  • Create New...