Description
Format string vulnerability in the emf_multipart_encrypted function in mail/em-format.c in Evolution 2.12.3 and earlier allows remote attackers to execute arbitrary code via a crafted encrypted message, as demonstrated using the Version field.
Published: 2008-03-06
Score: 6.8 Medium
EPSS: 16.1% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1512-1 New evolution packages fix arbitrary code execution
Ubuntu USN Ubuntu USN USN-583-1 Evolution vulnerability
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00003.html cve-icon cve-icon
http://secunia.com/advisories/29057 cve-icon cve-icon
http://secunia.com/advisories/29163 cve-icon cve-icon
http://secunia.com/advisories/29210 cve-icon cve-icon
http://secunia.com/advisories/29244 cve-icon cve-icon
http://secunia.com/advisories/29258 cve-icon cve-icon
http://secunia.com/advisories/29264 cve-icon cve-icon
http://secunia.com/advisories/29317 cve-icon cve-icon
http://secunia.com/advisories/30437 cve-icon cve-icon
http://secunia.com/advisories/30491 cve-icon cve-icon
http://secunia.com/secunia_research/2008-8/advisory/ cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200803-12.xml cve-icon cve-icon
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0105 cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1512 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/512491 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2008:063 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0177.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0178.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/492684/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/28102 cve-icon cve-icon
http://www.securitytracker.com/id?1019540 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-583-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0768/references cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/41011 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-2310 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-0072 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10701 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-0072 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00190.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00195.html cve-icon cve-icon
History

No history.

Subscriptions

Gnome Evolution
Linux Linux Kernel
Redhat Enterprise Linux Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T07:32:23.892Z

Reserved: 2008-01-03T00:00:00.000Z

Link: CVE-2008-0072

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-03-06T00:44:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2008-0072

cve-icon Redhat

Severity : Critical

Publid Date: 2008-03-05T00:00:00Z

Links: CVE-2008-0072 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses