Korean
<< Back
VID 23072
Severity 40
Port 2401
Protocol TCP
Class CVS
Detailed Description The CVS server, according to its version number, has multiple vulnerabilities.
CVS (Concurrent Versions System) is an open-source source code management and distribution system available for most Linux and Unix-based operating systems. CVS versions 1.11.x up to 1.11.16, and 1.12.x up to 1.12.8 could allow a remote attacker to execute arbitrary code on the affected host or to cause the CVS service crash.
Among the vulnerabilities deemed likely to be exploitable were:

- a flaw relating to malformed "Entry" lines (CAN-2004-0414)
- a double-free relating to the error_prog_name string (CAN-2004-0416)
- an argument integer overflow (CAN-2004-0417)
- out-of-bounds writes in serv_notify (CAN-2004-0418)

* Note: This check solely relied on the version number of the remote CVS server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0215.html

* Platforms Affected:
CVS 1.11.x up to 1.11.16
CVS 1.12.x up to 1.12.8
Linux Any version
UNIX Any version
Recommendation Upgrade to a fixed version of CVS (1.11.17 or 1.12.9), available from the CVS Web site at http://ccvs.cvshome.org/servlets/ProjectDownloadList

For SuSE Linux:
Upgrade to the latest cvs package, as listed in SuSE Security Announcement SuSE-SA:2004:015 at http://www.suse.de/de/security/2004_15_cvs.html

For Red Hat Linux:
Upgrade to the latest version of cvs, as listed in Red Hat Security Advisory RHSA-2004:233-07 at http://www.redhat.com/support/errata/RHSA-2004-233.html

For other distributions:
Contact your vendor for patch or upgrade information.
Related URL CVE-2004-0414,CVE-2004-0416,CVE-2004-0417,CVE-2004-0418 (CVE)
Related URL (SecurityFocus)
Related URL 16364,16365,16366,16367 (ISS)