Integer overflow in camel-lock-helper in Evolution 2.0.2 and earlier allows local users or remote malicious POP3 servers to execute arbitrary code via a length value of -1, which leads to a zero byte memory allocation and a buffer overflow.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 3.0 | 3.0.x |
gnome / evolution | - | 2.0.2.x |