Korean
<< Back
VID 23127
Severity 40
Port 2401
Protocol TCP
Class CVS
Detailed Description The CVS server, according to its version number, has a unspecified buffer overflow vulnerability. CVS (Concurrent Versions System) is an open-source source code management and distribution system available for most Linux and Unix-based operating systems. CVS versions prior to 1.11.20, and prior to 1.12.12 are vulnerable to a unspecified buffer overflow vulnerability, caused by a double free() bug. A remote authenticated attacker could exploit this vulnerability to execute arbitrary code on the affected host in the context of the vulnerable process.

* Note: This check solely relied on the version number of the remote CVS server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/14976/

* Platforms Affected:
CVS (Concurrent Versions System) prior to 1.11.20
CVS (Concurrent Versions System) prior to 1.12.12
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of CVS (1.11.20 or 1.12.12 or later), available from the CVS Web site at http://ccvs.cvshome.org/servlets/ProjectDownloadList

For Gentoo Linux:
Upgrade to the latest version of CVS (1.11.18-r1 or later), as listed in Gentoo Linux Security Advisory GLSA 200504-16 at http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml

For SUSE Linux:
Upgrade to the latest version of cvs, as listed in SUSE Security Announcement SUSE-SA:2005:024 at http://www.novell.com/linux/security/advisories/2005_24_cvs.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2005-0753 (CVE)
Related URL 13217 (SecurityFocus)
Related URL 20148 (ISS)