Secunia Research: Evolution Encrypted Message Format String Vulnerability

======================================================================

                     Secunia Research 05/03/2008

    - Evolution Encrypted Message Format String Vulnerability -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

======================================================================
1) Affected Software

Evolution 2.12.3

NOTE: Other versions may also be affected.

======================================================================
2) Severity

Rating: Highly critical
Impact: System compromise
Where:  Remote

======================================================================
3) Vendor's Description of Software

"Evolution provides integrated mail, addressbook and calendaring
functionality to users of the GNOME desktop."

Product Link:
http://www.gnome.org/projects/evolution/

======================================================================
4) Description of Vulnerability

Secunia Research has discovered a vulnerability in Evolution, which 
can be exploited by malicious people to compromise a vulnerable system.

A format string error in the "emf_multipart_encrypted()" function in
mail/em-format.c when displaying e.g. the "Version:" field from an
encrypted e-mail message can be exploited to execute arbitrary code 
via a specially crafted e-mail message.

Successful exploitation requires that the user selects a malicious 
e-mail message.

======================================================================
5) Solution

Do not select untrusted e-mail messages.

Various Linux vendors will issue patched versions soon.

======================================================================
6) Time Table

03/03/2008: Vulnerability reported to vendor-sec list.
03/03/2008: Vulnerability information leaked by Novell to the public.
05/03/2008: Public disclosure.

======================================================================
7) Credits

Discovered by Ulf Harnhammar, Secunia Research.

======================================================================
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2008-0072 for the vulnerability.

======================================================================
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private
individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the
security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
10) Verification

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-8/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================