Vulnerabilities > CVE-2006-0528 - Buffer Overflow vulnerability in GNOME Evolution Inline XML File Attachment

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
gnome
nessus
exploit available

Summary

The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment.

Exploit-Db

descriptionGNOME Evolution 2.2.3/2.3.x Inline XML File Attachment Buffer Overflow Vulnerability. CVE-2006-0528. Dos exploit for linux platform
idEDB-ID:27145
last seen2016-02-03
modified2006-01-28
published2006-01-28
reporterMike Davis
sourcehttps://www.exploit-db.com/download/27145/
titleGNOME Evolution 2.2.3/2.3.x Inline XML File Attachment Buffer Overflow Vulnerability

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-265-1.NASL
    descriptionWhen rendering glyphs, the cairo graphics rendering library did not check the maximum length of character strings. A request to display an excessively long string with cairo caused a program crash due to an X library error. Mike Davis discovered that this could be turned into a Denial of Service attack in Evolution. An email with an attachment with very long lines caused Evolution to crash repeatedly until that email was manually removed from the mail folder. This only affects Ubuntu 5.10. Previous Ubuntu releases did not use libcairo for text rendering. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21151
    published2006-03-27
    reporterUbuntu Security Notice (C) 2006-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21151
    titleUbuntu 5.10 : libcairo vulnerability (USN-265-1)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2006-057.NASL
    descriptionGNOME Evolution allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains
    last seen2020-06-01
    modified2020-06-02
    plugin id21115
    published2006-03-21
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21115
    titleMandrake Linux Security Advisory : cairo (MDKSA-2006:057)