DEBIAN-CVE-2005-2549

Source
https://security-tracker.debian.org/tracker/CVE-2005-2549
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2005-2549.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2005-2549
Upstream
Published
2005-08-12T04:00:00Z
Modified
2025-09-24T23:53:44.154676Z
Summary
[none]
Details

Multiple format string vulnerabilities in Evolution 1.5 through 2.3.6.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) full vCard data, (2) contact data from remote LDAP servers, or (3) task list data from remote servers.

References

Affected packages

Debian:11 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-3

Ecosystem specific

{
    "urgency": "high"
}

Debian:12 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-3

Ecosystem specific

{
    "urgency": "high"
}

Debian:13 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-3

Ecosystem specific

{
    "urgency": "high"
}

Debian:14 / evolution

Package

Name
evolution
Purl
pkg:deb/debian/evolution?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.3-3

Ecosystem specific

{
    "urgency": "high"
}