Critical severity9.8NVD Advisory· Published Jan 24, 2005· Updated Apr 16, 2026
CVE-2005-0102
CVE-2005-0102
Description
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Affected products
2- cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- distro.conectiva.com.br/atualizacoes/nvdBroken LinkPatchVendor Advisory
- www.debian.org/security/2005/dsa-673nvdMailing ListPatchThird Party Advisory
- www.redhat.com/support/errata/RHSA-2005-397.htmlnvdBroken LinkPatchVendor Advisory
- www.securityfocus.com/bid/12354nvdBroken LinkPatchThird Party AdvisoryVDB EntryVendor Advisory
- security.gentoo.org/glsa/glsa-200501-35.xmlnvdThird Party Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/19031nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/13830nvdBroken Link
- www.redhat.com/support/errata/RHSA-2005-238.htmlnvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9616nvdBroken Link
- usn.ubuntu.com/69-1/nvdBroken Link
News mentions
0No linked articles in our index yet.