CVE-2011-3201

CVSS V2 Medium 4.3 CVSS V3 None
Description
GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Overview
  • CVE ID
  • CVE-2011-3201
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2013-03-08T21:55:01
  • Last Modified Date
  • 2023-02-13T04:32:38
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:* 1 OR 3.0.3
cpe:2.3:a:gnome:evolution:1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.4.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.8.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.10.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.12.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.22.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.22.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.24.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.26.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.26.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.28.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.30.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:gnome:evolution:2.32.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 08:52:48 Added to TrackCVE
2023-02-02 16:04:00 2023-02-02T15:15:24 CVE Modified Date updated
2023-02-02 16:04:01 GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email. CVE-2011-3201 evolution: mailto URL scheme attachment header improper input validation Description updated
2023-02-02 16:04:03 References updated
2023-02-13 05:05:32 2023-02-13T04:32:38 CVE Modified Date updated
2023-02-13 05:05:33 CVE-2011-3201 evolution: mailto URL scheme attachment header improper input validation GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email. Description updated