CVE-2006-2789

NameCVE-2006-2789
DescriptionEvolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
evolution (PTS)stretch (security), stretch3.22.6-1+deb9u2fixed
buster3.30.5-1.1fixed
bullseye3.38.3-1fixed
bookworm, sid3.44.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
evolutionsourcesarge(not affected)
evolutionsource(unstable)2.4.0-1low

Notes

[sarge] - evolution <not-affected> (Not reproducible on Sarge's evolution)
Verified that the patch has been applied in 2.4.0-1,
may have been fixed earlier.

Search for package or bug name: Reporting problems