Vulnerability Name:

CVE-2006-0528 (CCN-32550)

Assigned:2006-01-28
Published:2006-01-28
Updated:2018-10-03
Summary:The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Full-Disclosure Mailing List, Mon Jul 08 2002 - 19:22:34 CDT
gnome evolution mail client inline text file DoS issue

Source: FULLDISC
Type: UNKNOWN
20060128 gnome evolution mail client inline text file DoS issue

Source: MITRE
Type: CNA
CVE-2006-0528

Source: SECUNIA
Type: Vendor Advisory
19504

Source: SREASON
Type: UNKNOWN
610

Source: CCN
Type: Evolution Web site
Evolution Overview

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:057

Source: SUSE
Type: Vendor Advisory
SUSE-SR:2006:007

Source: CCN
Type: OSVDB ID: 22923
GNOME Evolution Mail Client Inline Text File Content-Disposition DoS

Source: BID
Type: Exploit
16408

Source: CCN
Type: BID-16408
GNOME Evolution Inline XML File Attachment Buffer Overflow Vulnerability

Source: CCN
Type: USN-265-1
cairo/Evolution vulnerability

Source: XF
Type: UNKNOWN
cairo-inline-text-dos(32550)

Source: UBUNTU
Type: UNKNOWN
USN-265-1

Source: SUSE
Type: SUSE-SR:2006:007
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gnome:evolution:2.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:gnome:evolution:2.3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:suse:suse_linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20060528
    V
    CVE-2006-0528
    2022-06-30
    oval:org.opensuse.security:def:112040
    P
    cairo-devel-1.16.0-3.14 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105595
    P
    cairo-devel-1.16.0-3.14 on GA media (Moderate)
    2021-10-01
    BACK
    gnome evolution 2.3.1
    gnome evolution 2.3.2
    gnome evolution 2.3.3
    gnome evolution 2.3.4
    gnome evolution 2.3.5
    gnome evolution 2.3.6
    gnome evolution 2.3.6.1
    gnome evolution 2.3.7
    gnome evolution 2.3.7
    gnome evolution 2.3.6.1
    gnome evolution 2.3.6
    gnome evolution 2.3.5
    gnome evolution 2.3.4
    gnome evolution 2.3.3
    gnome evolution 2.3.2
    gnome evolution 2.3.1
    suse suse linux *
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux 2006