SuSE 10 Security Update : evolution-data-server (ZYPP Patch Number 7029)

high Nessus Plugin ID 49847

Language:

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

The following bugs have been fixed :

evolution considered S/MIME signatures to be valid even for modified mails (CVE-2009-0547). specially crafted base64 encoded messages could cause a heap buffer overflow (CVE-2009-0587). A POP3 server sending overly long lines could crash evolution.

Solution

Apply ZYPP patch number 7029.

See Also

http://support.novell.com/security/cve/CVE-2009-0547.html

http://support.novell.com/security/cve/CVE-2009-0587.html

Plugin Details

Severity: High

ID: 49847

File Name: suse_evolution-data-server-7029.nasl

Version: 1.9

Type: local

Agent: unix

Published: 10/11/2010

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/5/2010

Reference Information

CVE: CVE-2009-0547, CVE-2009-0587

CWE: 189, 310