* SITIC Vulnerability Advisory * Advisory Name: Evolution multiple remote format string bugs Advisory Reference: SA05-001 Date of initial release: 2005-08-10 Product: Evolution 1.5, 2.0, 2.1, 2.2, 2.3 Platform: Linux, BSD systems, Unix Effect: Remote code execution Vulnerability Identifier: Not assigned Overview: Evolution suffers from several format string bugs when handling data from remote sources. These bugs lead to crashes or the execution of arbitrary assembly language code. Details: 1) The first format string bug occurs when viewing the full vCard data attached to an e-mail message. When opening an e-mail message, only a compact view of some of the fields from the vCard is displayed, and this does not trigger the vulnerability. To be affected, the user must click on Show Full vCard or perform similar actions such as clicking on Save in Addressbook and then viewing the saved data under the Contacts tab. Why is this important? An attacker might notice that an organisation uses Evolution, for instance after seeing the "X-Mailer: Evolution x.y.z" e-mail header in their e-mails. He or she could then send out e-mail messages with malicious vCards to many e-mail accounts at the organisation, in the hope that some of the recipients will view the full vCard data sooner or later, thus exposing the organisation to this format string bug. 2) The second format string bug occurs when displaying contact data from remote LDAP servers. 3) The third format string bug occurs when displaying task list data from remote servers. 4) The fourth, and least serious, format string bug occurs when the user goes to the Calendars tab to save task list data that is vulnerable to problem 3 above. Other calendar entries that do not come from task lists are also affected. Mitigating factors: Users that never use any of the vulnerable features in Evolution are not affected. Affected versions: o Evolution 1.5 to Evolution 2.3.6.1 Recommendations: We recommend that users either upgrade to Evolution 2.3.7 (unstable) or apply our unofficial patch to their Evolution installation. Patch information: Evolution 2.3.7 is available from the following source: o http://ftp.gnome.org/pub/gnome/sources/evolution/ Our unofficial patch is available from our home page: o http://www.sitic.se Acknowledgments: These vulnerabilities were discovered by Ulf Harnhammar for SITIC, Swedish IT Incident Centre.
obz, liquidx: please bump or apply proposed fix.
Pulling in the rest of the Gnome herd. We're late on this one, please bump evolution with proposed patch or advise.
Heres the link to the patch for reference, its a tad difficult to find on the site. http://www.sitic.se/eng/advisories_and_recommendations/sa05-001.html http://www.sitic.se/dokument/evolution.formatstring.patch
patched, tested patch / compile, committed as: evolution-2.2.3-r3.ebuild
Arches, please test evolution-2.2.3-r3 and mark stable, thanks.
Stable on SPARC.
Stable on hppa
This is CAN-2005-2550, http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2550
No, it's CAN-2005-2549 and CAN-2005-2550. // Ulf Harnhammar
Hui, the VIPs are watching us :) Thanks for the headsup!
Stable on amd64
Stable on the almighty alpha architecture ! Cheers, Ferdy
Stable on ppc.
All security covered arches marked stable, should be ready for GLSA
Stable on ia64.
GLSA 200508-12. Thanks to everbody who helped.