evolution is vulnerable to arbitrary code execution. A heap-based buffer overflow flaw was found in the way Evolution parsed iCalendar attachments with an overly long “DESCRIPTION” property string. If a user responded to a carefully crafted iCalendar attachment in a particular way, arbitrary code could be executed as the user running Evolution.
lists.opensuse.org/opensuse-security-announce/2008-06/msg00003.html
secunia.com/advisories/30298
secunia.com/advisories/30527
secunia.com/advisories/30564
secunia.com/advisories/30571
secunia.com/advisories/30702
secunia.com/advisories/30716
secunia.com/secunia_research/2008-23/advisory/
security.gentoo.org/glsa/glsa-200806-06.xml
www.mandriva.com/security/advisories?name=MDVSA-2008:111
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2008-0514.html
www.redhat.com/support/errata/RHSA-2008-0515.html
www.securityfocus.com/bid/29527
www.securitytracker.com/id?1020170
www.ubuntu.com/usn/usn-615-1
www.vupen.com/english/advisories/2008/1732/references
access.redhat.com/errata/RHSA-2008:0514
exchange.xforce.ibmcloud.com/vulnerabilities/42826
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10337
www.redhat.com/archives/fedora-package-announce/2008-June/msg00157.html
www.redhat.com/archives/fedora-package-announce/2008-June/msg00178.html
www.redhat.com/archives/fedora-package-announce/2008-June/msg00179.html