GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0516.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | Third Party Advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=657374 | Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=733504 | Patch Issue Tracking Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82450 | |
https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56 | Patch Vendor Advisory |
https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2013-03-08 21:55
Updated : 2024-02-04 18:16
NVD link : CVE-2011-3201
Mitre link : CVE-2011-3201
CVE.ORG link : CVE-2011-3201
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
gnome
- evolution
oracle
- solaris
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor