Korean
<< Back
VID 23051
Severity 30
Port 2401
Protocol TCP
Class CVS
Detailed Description The CVS server, according to its version number, has a file manipulation vulnerability. CVS (Concurrent Versions System) is an open-source source code management and distribution system available for most Linux and Unix-based operating systems. CVS versions 1.11.9 and earlier could allow a remote attacker to create directories and files on the affected system. By sending a malformed module request, a remote attacker could create directories and files at the root of the filesystem holding the CVS repository.

* Note: This check solely relied on the version number of the remote CVS server to assess this vulnerability, so this might be a false positive.

* References:
http://ccvs.cvshome.org/servlets/NewsItemView?newsID=84&JServSessionIdservlets=8u3x1myav1

* Platforms Affected:
CVS (Concurrent Versions System) 1.11.9 and earlier
Linux Any version
UNIX Any version
Recommendation Upgrade to the latest version of CVS (1.11.10 or later), available from the Concurrent Versions System Web site at http://ccvs.cvshome.org/servlets/ProjectDownloadList

For Slackware Linux:
Upgrade to the latest cvs package, as listed in slackware-security Mailing List, Thu, 11 Dec 2003 at http://www.slackware.com/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.402538

For Mandrake Linux:
Upgrade to the latest cvs package, as listed in MandrakeSoft Security Advisory MDKSA-2003:112-1 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:112-1

For Gentoo Linux:
Upgrade to the latest version of cvs (1.11.10 or later), as listed in Gentoo Linux Security Announcement 200312-04 at http://www.linuxsecurity.com/advisories/gentoo_advisory-3859.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2003-0977 (CVE)
Related URL 9178 (SecurityFocus)
Related URL 13929 (ISS)