CVE-2006-2789

NameCVE-2006-2789
DescriptionEvolution 2.2.x and 2.3.x in GNOME 2.7 and 2.8, when "load images if sender in addressbook" is enabled, allows remote attackers to cause a denial of service (persistent crash) via a crafted "From" header that triggers an assert error in camel-internet-address.c when a null pointer is used.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
evolution (PTS)buster3.30.5-1.1fixed
bullseye (security), bullseye3.38.3-1+deb11u2fixed
bookworm3.46.4-2fixed
sid, trixie3.50.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
evolutionsourcesarge(not affected)
evolutionsource(unstable)2.4.0-1low

Notes

[sarge] - evolution <not-affected> (Not reproducible on Sarge's evolution)
Verified that the patch has been applied in 2.4.0-1,
may have been fixed earlier.

Search for package or bug name: Reporting problems