CVE-2006-2789
https://notcve.org/view.php?id=CVE-2006-2789
Evolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used. • http://bugzilla.gnome.org/show_bug.cgi?id=309453 http://bugzilla.gnome.org/show_bug.cgi?id=311440 http://www.mandriva.com/security/advisories?name=MDKSA-2006:094 http://www.securityfocus.com/bid/18212 •
CVE-2006-0528 – GNOME Evolution 2.2.3/2.3.x - Inline XML File Attachment Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-0528
The cairo library (libcairo), as used in GNOME Evolution and possibly other products, allows remote attackers to cause a denial of service (persistent client crash) via an attached text file that contains "Content-Disposition: inline" in the header, and a very long line in the body, which causes the client to repeatedly crash until the e-mail message is manually removed, possibly due to a buffer overflow, as demonstrated using an XML attachment. • https://www.exploit-db.com/exploits/27145 http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0925.html http://secunia.com/advisories/19504 http://securityreason.com/securityalert/610 http://www.mandriva.com/security/advisories?name=MDKSA-2006:057 http://www.novell.com/linux/security/advisories/2006_07_sr.html http://www.securityfocus.com/bid/16408 https://usn.ubuntu.com/265-1 •