Vulnerability Details CVE-2005-0102
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.4%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.2
Products affected by CVE-2005-0102
-
cpe:2.3:a:gnome:evolution:-
-
cpe:2.3:a:gnome:evolution:0.0.2
-
cpe:2.3:a:gnome:evolution:0.0.3
-
cpe:2.3:a:gnome:evolution:0.0.4
-
cpe:2.3:a:gnome:evolution:0.0.5
-
cpe:2.3:a:gnome:evolution:0.0.6
-
cpe:2.3:a:gnome:evolution:0.0.7
-
cpe:2.3:a:gnome:evolution:0.0.90
-
cpe:2.3:a:gnome:evolution:0.0.91
-
cpe:2.3:a:gnome:evolution:0.0.92
-
cpe:2.3:a:gnome:evolution:0.0.93
-
cpe:2.3:a:gnome:evolution:0.0.94
-
cpe:2.3:a:gnome:evolution:0.0.94.1
-
cpe:2.3:a:gnome:evolution:0.0.95
-
cpe:2.3:a:gnome:evolution:0.0.96
-
cpe:2.3:a:gnome:evolution:0.0.97
-
cpe:2.3:a:gnome:evolution:0.0.98
-
cpe:2.3:a:gnome:evolution:0.0.99
-
cpe:2.3:a:gnome:evolution:1.0.0
-
cpe:2.3:a:gnome:evolution:1.0.1
-
cpe:2.3:a:gnome:evolution:1.0.2
-
cpe:2.3:a:gnome:evolution:1.0.3
-
cpe:2.3:a:gnome:evolution:1.0.4
-
cpe:2.3:a:gnome:evolution:1.0.8
-
cpe:2.3:a:gnome:evolution:1.1.0
-
cpe:2.3:a:gnome:evolution:1.1.1
-
cpe:2.3:a:gnome:evolution:1.1.2
-
cpe:2.3:a:gnome:evolution:1.1.3
-
cpe:2.3:a:gnome:evolution:1.1.4
-
cpe:2.3:a:gnome:evolution:1.1.4.1
-
cpe:2.3:a:gnome:evolution:1.1.5
-
cpe:2.3:a:gnome:evolution:1.1.6
-
cpe:2.3:a:gnome:evolution:1.10.2
-
cpe:2.3:a:gnome:evolution:1.10.3
-
cpe:2.3:a:gnome:evolution:1.11
-
cpe:2.3:a:gnome:evolution:1.11.3
-
cpe:2.3:a:gnome:evolution:1.11.4
-
cpe:2.3:a:gnome:evolution:1.11.5
-
cpe:2.3:a:gnome:evolution:1.11.90
-
cpe:2.3:a:gnome:evolution:1.11.91
-
cpe:2.3:a:gnome:evolution:1.11.92
-
cpe:2.3:a:gnome:evolution:1.12.0
-
cpe:2.3:a:gnome:evolution:1.12.1
-
cpe:2.3:a:gnome:evolution:1.12.2
-
cpe:2.3:a:gnome:evolution:1.12.3
-
cpe:2.3:a:gnome:evolution:1.2
-
cpe:2.3:a:gnome:evolution:1.2.0
-
cpe:2.3:a:gnome:evolution:1.2.1
-
cpe:2.3:a:gnome:evolution:1.2.2
-
cpe:2.3:a:gnome:evolution:1.2.3
-
cpe:2.3:a:gnome:evolution:1.2.4
-
cpe:2.3:a:gnome:evolution:1.3.1
-
cpe:2.3:a:gnome:evolution:1.3.2
-
cpe:2.3:a:gnome:evolution:1.3.3
-
cpe:2.3:a:gnome:evolution:1.3.3.1
-
cpe:2.3:a:gnome:evolution:1.3.4
-
cpe:2.3:a:gnome:evolution:1.3.5
-
cpe:2.3:a:gnome:evolution:1.3.6
-
cpe:2.3:a:gnome:evolution:1.3.6.1
-
cpe:2.3:a:gnome:evolution:1.3.7
-
cpe:2.3:a:gnome:evolution:1.3.8
-
cpe:2.3:a:gnome:evolution:1.4
-
cpe:2.3:a:gnome:evolution:1.4.0
-
cpe:2.3:a:gnome:evolution:1.4.1
-
cpe:2.3:a:gnome:evolution:1.4.1.1
-
cpe:2.3:a:gnome:evolution:1.4.2
-
cpe:2.3:a:gnome:evolution:1.4.2.1
-
cpe:2.3:a:gnome:evolution:1.4.3
-
cpe:2.3:a:gnome:evolution:1.4.4
-
cpe:2.3:a:gnome:evolution:1.4.5
-
cpe:2.3:a:gnome:evolution:1.4.6
-
cpe:2.3:a:gnome:evolution:1.5
-
cpe:2.3:a:gnome:evolution:1.5.1
-
cpe:2.3:a:gnome:evolution:1.5.3
-
cpe:2.3:a:gnome:evolution:1.5.4
-
cpe:2.3:a:gnome:evolution:1.5.5
-
cpe:2.3:a:gnome:evolution:1.5.9.0
-
cpe:2.3:a:gnome:evolution:1.5.91
-
cpe:2.3:a:gnome:evolution:1.5.92
-
cpe:2.3:a:gnome:evolution:1.6.0
-
cpe:2.3:a:gnome:evolution:1.6.1
-
cpe:2.3:a:gnome:evolution:1.6.2
-
cpe:2.3:a:gnome:evolution:1.6.3
-
cpe:2.3:a:gnome:evolution:1.7.1
-
cpe:2.3:a:gnome:evolution:1.7.2
-
cpe:2.3:a:gnome:evolution:1.7.3
-
cpe:2.3:a:gnome:evolution:1.7.4
-
cpe:2.3:a:gnome:evolution:1.7.90
-
cpe:2.3:a:gnome:evolution:1.7.90.1
-
cpe:2.3:a:gnome:evolution:1.7.91
-
cpe:2.3:a:gnome:evolution:1.7.92
-
cpe:2.3:a:gnome:evolution:1.8.0
-
cpe:2.3:a:gnome:evolution:1.8.1
-
cpe:2.3:a:gnome:evolution:1.8.2
-
cpe:2.3:a:gnome:evolution:1.9.1
-
cpe:2.3:a:gnome:evolution:1.9.3
-
cpe:2.3:a:gnome:evolution:2.0
-
cpe:2.3:a:gnome:evolution:2.0.0
-
cpe:2.3:a:gnome:evolution:2.0.1
-
cpe:2.3:a:gnome:evolution:2.0.2
-
cpe:2.3:o:debian:debian_linux:3.0