Integer overflow in camel-lock-helper in Evolution 2.0.2...
High severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Feb 8, 2024
Description
Published by the National Vulnerability Database
Jan 24, 2005
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Feb 8, 2024
Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
References