| VID |
23071 |
| Severity |
40 |
| Port |
2401 |
| Protocol |
TCP |
| Class |
CVS |
| Detailed Description |
The CVS server, according to its version number, has a heap-based buffer overflow vulnerability. CVS (Concurrent Versions System) is an open-source source code management and distribution system available for most Linux and Unix-based operating systems. CVS versions 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7 could allow a remote attacker to execute arbitrary code on the affected host, caused by improper validation of malformed "Entry" lines. A attacker who has access to a CVS server could use this vulnerability to execute arbitrary code under the UID which the CVS server is executing.
* Note: This check solely relied on the version number of the remote CVS server to assess this vulnerability, so this might be a false positive.
* References: http://security.e-matters.de/advisories/072004.html
* Platforms Affected: CVS 1.11.x up to 1.11.15 CVS 1.12.x up to 1.12.7 Linux Any version UNIX Any version |
| Recommendation |
Upgrade to a fixed version of CVS (1.11.16 or 1.12.8), available from the CVS Web site at http://ccvs.cvshome.org/servlets/ProjectDownloadList
For SuSE Linux: Upgrade to the latest cvs package, as listed in SuSE Security Announcement SuSE-SA:2004:013 at http://www.suse.com/de/security/2004_13_cvs.html
For FreeBSD: Upgrade to the latest version of CVS, as listed in FreeBSD, Inc. Security Advisory FreeBSD-SA-04:10 at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc
For Red Hat Linux 9: Upgrade to the latest version of cvs, as listed in Red Hat Security Advisory RHSA-2004:190-14 at http://www.redhat.com/support/errata/RHSA-2004-190.html
For Debian GNU/Linux 3.0 (woody): Upgrade to the latest cvs package, as listed in Debian Security Advisory DSA-505-1 at http://www.debian.org/security/2004/dsa-505
For other distributions: Contact your vendor for patch or upgrade information. |
| Related URL |
CVE-2004-0396 (CVE) |
| Related URL |
10384 (SecurityFocus) |
| Related URL |
(ISS) |
|