CVE-2011-3201
CVSS V2 Medium 4.3
CVSS V3 None
Description
GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Overview
- CVE ID
- CVE-2011-3201
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2013-03-08T21:55:01
- Last Modified Date
- 2023-02-13T04:32:38
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:*:*:*:*:*:*:*:* | 1 | OR | 3.0.3 | |
cpe:2.3:a:gnome:evolution:1.0.8:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.2.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.2.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.2.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.2.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.4.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.4.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.4.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.4.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:1.11:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.0.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.0.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.2.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.6.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.3.7:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.4.2.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.6:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.8.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.10.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.12:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.12.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.22.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.22.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.24:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.24.5:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.26.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.26.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.28.3.1:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.30.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:gnome:evolution:2.32.3:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
References
Reference URL | Reference Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-0516.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2013:0516 | |
https://access.redhat.com/security/cve/CVE-2011-3201 | |
https://bugzilla.gnome.org/show_bug.cgi?id=657374 | Issue Tracking |
https://bugzilla.redhat.com/show_bug.cgi?id=733504 | Patch Issue Tracking Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82450 | |
https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56 | Patch Vendor Advisory |
https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3 | Patch Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2011-3201 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3201 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:52:48 | Added to TrackCVE | |||
2023-02-02 16:04:00 | 2023-02-02T15:15:24 | CVE Modified Date | updated | |
2023-02-02 16:04:01 | GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email. | CVE-2011-3201 evolution: mailto URL scheme attachment header improper input validation | Description | updated |
2023-02-02 16:04:03 | References | updated | ||
2023-02-13 05:05:32 | 2023-02-13T04:32:38 | CVE Modified Date | updated | |
2023-02-13 05:05:33 | CVE-2011-3201 evolution: mailto URL scheme attachment header improper input validation | GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email. | Description | updated |