Executive Summary

Title evolution security update
Name DSA-4457 First vendor Publication 2019-06-07
Vendor Debian Last vendor Modification 2019-06-07
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Hanno Böck discovered that Evolution was vulnerable to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted HTML email. This issue was mitigated by moving the security bar with encryption and signature information above the message headers.

For the stable distribution (stretch), this problem has been fixed in version 3.22.6-1+deb9u2.

We recommend that you upgrade your evolution packages.

For the detailed security status of evolution please refer to its security tracker page at: https://security-tracker.debian.org/tracker/evolution

Original Source

Url : http://www.debian.org/security/2019/dsa-4457

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-347 Improper Verification of Cryptographic Signature

CPE : Common Platform Enumeration

Application 46
Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-06-07 09:19:19
  • First insertion