Vulnerability Name:

CVE-2005-2549 (CCN-21774)

Assigned:2005-08-10
Published:2005-08-10
Updated:2018-10-03
Summary:Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-2549

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2005:1004
Fix for Evolution vulnerabilities

Source: CCN
Type: Academic Computer Club Web page
Index of /pub/gnome/sources/evolution/2.3

Source: FULLDISC
Type: UNKNOWN
20050810 Evolution multiple remote format string bugs

Source: CCN
Type: RHSA-2005-267
Evolution security update

Source: CCN
Type: SA16394
GNOME Evolution Multiple Format String Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
16394

Source: SECUNIA
Type: UNKNOWN
19380

Source: DEBIAN
Type: UNKNOWN
DSA-1016

Source: DEBIAN
Type: DSA-1016
evolution -- format string vulnerabilities

Source: CCN
Type: GLSA-200508-12
Evolution: Format string vulnerabilities

Source: CCN
Type: Evolution Web site
Evolution

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2005:141

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:054

Source: FEDORA
Type: UNKNOWN
FEDORA-2005-743

Source: REDHAT
Type: UNKNOWN
RHSA-2005:267

Source: BUGTRAQ
Type: UNKNOWN
20050810 Evolution multiple remote format string bugs

Source: BID
Type: UNKNOWN
14532

Source: CCN
Type: BID-14532
GNOME Evolution Multiple Format String Vulnerabilities

Source: CCN
Type: SITIC Vulnerability Advisory SA05-001
Evolution multiple remote format string bugs

Source: MISC
Type: UNKNOWN
http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html

Source: XF
Type: UNKNOWN
evolution-vcard-format-string(21774)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9553

Source: UBUNTU
Type: UNKNOWN
USN-166-1

Source: SUSE
Type: SUSE-SA:2005:054
evolution: remote code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnome:evolution:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-2549 (CCN-21775)

    Assigned:2005-08-10
    Published:2005-08-10
    Updated:2018-10-03
    Summary:Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-2549

    Source: CCN
    Type: Conectiva Linux Security Announcement CLSA-2005:1004
    Fix for Evolution vulnerabilities

    Source: CCN
    Type: Academic Computer Club Web page
    Index of /pub/gnome/sources/evolution/2.3

    Source: CCN
    Type: RHSA-2005-267
    Evolution security update

    Source: CCN
    Type: SA16394
    GNOME Evolution Multiple Format String Vulnerabilities

    Source: DEBIAN
    Type: DSA-1016
    evolution -- format string vulnerabilities

    Source: CCN
    Type: GLSA-200508-12
    Evolution: Format string vulnerabilities

    Source: CCN
    Type: Evolution Web site
    Evolution

    Source: CCN
    Type: BID-14532
    GNOME Evolution Multiple Format String Vulnerabilities

    Source: CCN
    Type: SITIC Vulnerability Advisory SA05-001
    Evolution multiple remote format string bugs

    Source: XF
    Type: UNKNOWN
    evolution-ldap-format-string(21775)

    Source: SUSE
    Type: SUSE-SA:2005:054
    evolution: remote code execution

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-2549 (CCN-21776)

    Assigned:2005-08-10
    Published:2005-08-10
    Updated:2005-08-10
    Summary:Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2005-2549

    Source: CCN
    Type: Conectiva Linux Security Announcement CLSA-2005:1004
    Fix for Evolution vulnerabilities

    Source: CCN
    Type: Academic Computer Club Web page
    Index of /pub/gnome/sources/evolution/2.3

    Source: CCN
    Type: RHSA-2005-267
    Evolution security update

    Source: CCN
    Type: SA16394
    GNOME Evolution Multiple Format String Vulnerabilities

    Source: DEBIAN
    Type: DSA-1016
    evolution -- format string vulnerabilities

    Source: CCN
    Type: GLSA-200508-12
    Evolution: Format string vulnerabilities

    Source: CCN
    Type: Evolution Web site
    Evolution

    Source: CCN
    Type: BID-14532
    GNOME Evolution Multiple Format String Vulnerabilities

    Source: CCN
    Type: SITIC Vulnerability Advisory SA05-001
    Evolution multiple remote format string bugs

    Source: XF
    Type: UNKNOWN
    evolution-task-list-data-format-string(21776)

    Source: SUSE
    Type: SUSE-SA:2005:054
    evolution: remote code execution

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20052549
    V
    CVE-2005-2549
    2015-11-16
    oval:org.mitre.oval:def:9553
    V
    Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.
    2013-04-29
    oval:org.debian:def:1016
    V
    format string vulnerabilities
    2006-03-23
    oval:com.redhat.rhsa:def:20050267
    P
    RHSA-2005:267: Evolution security update (Important)
    2005-08-29
    BACK
    gnome evolution 1.5
    gnome evolution 2.0
    gnome evolution 2.1
    gnome evolution 2.2
    gnome evolution 2.3.1
    gnome evolution 2.3.2
    gnome evolution 2.3.3
    gnome evolution 2.3.4
    gnome evolution 2.3.5
    gnome evolution 2.3.6.1
    gnome evolution 2.3.6.1
    gnome evolution 2.3.5
    gnome evolution 2.3.4
    gnome evolution 2.3.3
    gnome evolution 2.3.2
    gnome evolution 2.3.1
    gnome evolution 1.5
    gnome evolution 2.0
    gnome evolution 2.1
    gnome evolution 2.2
    debian debian linux 3.0
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    conectiva linux 10
    suse suse linux 9.2
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    suse suse linux 9.3
    gnome evolution 2.3.6.1
    gnome evolution 2.3.5
    gnome evolution 2.3.4
    gnome evolution 2.3.3
    gnome evolution 2.3.2
    gnome evolution 2.3.1
    gnome evolution 1.5
    gnome evolution 2.0
    gnome evolution 2.1
    gnome evolution 2.2
    debian debian linux 3.0
    gentoo linux *
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    conectiva linux 10
    suse suse linux 9.2
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    debian debian linux 3.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    suse suse linux 9.3