Vulnerability Details : CVE-2007-1002
Format string vulnerability in the write_html function in calendar/gui/e-cal-component-memo-preview.c in Evolution Shared Memo 2.8.2.1, and possibly earlier versions, allows user-assisted remote attackers to execute arbitrary code via format specifiers in the categories of a crafted shared memo.
Vulnerability category: Execute code
Products affected by CVE-2007-1002
- cpe:2.3:a:evolution:shared_memo:2.8.2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1002
20.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-1002
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2007-1002
-
http://www.vupen.com/english/advisories/2007/1058
Site en construction
-
http://www.securityfocus.com/archive/1/463406/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/33106
Evolution write_html() format string CVE-2007-1002 Vulnerability Report
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10100
404 Not Found
-
http://www.securityfocus.com/bid/23073
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:070
Mandriva
-
http://security.gentoo.org/glsa/glsa-200706-02.xml
Evolution: User-assisted execution of arbitrary code (GLSA 200706-02) — Gentoo security
-
http://www.securityfocus.com/archive/1/464820/30/7170/threaded
-
http://www.debian.org/security/2007/dsa-1325
[SECURITY] [DSA 1325-1] New evolution packages fix arbitrary code execution
-
http://www.novell.com/linux/security/advisories/2007_15_sr.html
Security - Support | SUSE
-
http://www.ubuntu.com/usn/usn-442-1
-
http://www.securitytracker.com/id?1017808
GoDaddy Domain Name Search
-
https://rhn.redhat.com/errata/RHSA-2007-0158.html
RHSA-2007:0158 - Security Advisory - Red Hat Customer Portal
Jump to