Rapid7 Vulnerability & Exploit Database

RHSA-2009:0355: evolution and evolution-data-server security update

Back to Search

RHSA-2009:0355: evolution and evolution-data-server security update



Evolution is the integrated collection of e-mail, calendaring, contactmanagement, communications, and personal information management (PIM) toolsfor the GNOME desktop environment.Evolution Data Server provides a unified back-end for applications whichinteract with contacts, task and calendar information. Evolution DataServer was originally developed as a back-end for Evolution, but is nowused by multiple other applications.Evolution did not properly check the Secure/Multipurpose Internet MailExtensions (S/MIME) signatures used for public key encryption and signingof e-mail messages. An attacker could use this flaw to spoof a signature bymodifying the text of the e-mail message displayed to the user. (CVE-2009-0547)It was discovered that evolution did not properly validate NTLM (NT LANManager) authentication challenge packets. A malicious server using NTLMauthentication could cause evolution to disclose portions of its memory orcrash during user authentication. (CVE-2009-0582)Multiple integer overflow flaws which could cause heap-based bufferoverflows were found in the Base64 encoding routines used by evolution andevolution-data-server. This could cause evolution, or an application usingevolution-data-server, to crash, or, possibly, execute an arbitrary codewhen large untrusted data blocks were Base64-encoded. (CVE-2009-0587)All users of evolution and evolution-data-server are advised to upgrade tothese updated packages, which contain backported patches to correct theseissues. All running instances of evolution and evolution-data-server mustbe restarted for the update to take effect.


  • redhat-upgrade-evolution
  • redhat-upgrade-evolution-data-server
  • redhat-upgrade-evolution-data-server-devel
  • redhat-upgrade-evolution-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center