Linux Compatible
  • News
    • Channels
    • Archive
    • Search
    • Submit
  • Articles
    • Categories
  • Knowledgebase
  • Compatibility
    • Search
  • Links
  • Forums
  • Twitter
Advertisement

Latest News
[ Windows | Linux | Apple ]

· Core i7 8700K vs. Ryzen 7 2700X With Rise of The Tomb Raider On Linux and more
· OpenVPN Security Update (SSA:2018-116-01) for Slackware
· Red Hat Enterprise Linux 6.10 Beta released
· ZSH Security Update for openSUSE
· Ubuntu 18.04 LTS (Bionic Beaver) released
· Unbreakable Enterprise Kernel Security Update for Oracle Linux 6 and 7
· Drupal7 Security Update for Debian 7 LTS
· 4GHz CPU Battle: AMD 2nd-Gen Ryzen vs. Intel 8th-Gen Core and more
· BuildStream 1.1.3 released
· Windows 10 Insider Preview Build 17655 for Skip Ahead

Upcoming News
· Samsung 860 Pro SSD Review @ Vortez
· Raijintek Orcus 240 @ TechPowerUp
· Team Group Cardea Zero 240 GB @ TechPowerUp
· Guru3D Rig of the Month - January 2018
· Cooler Master MK750 Review @ Vortez
· Seagate Skyhawk 10TB SATA III HDD Review
· Vulkan Continues To Show Its Gaming Strength On Low-End Hardware
· Seagate IronWolf ST12000VN0007 12TB Hard Drive Review @ APH Networks
· Sennheiser Game One @ TechPowerUp
· be quiet! Straight Power 11 1000W Power Supply Review

Linux Compatibility
· Brother DCP-L2540DN
· Sound Blaster E5
· WD Elements 500GB external hard drive
· Canon D660U Flatbad scanner
· Umax Astra 4500 USB Scanner
· Logitech QuickCam Pro 4000
· Dell Latitude E6420
· Creative Sound Blaster Z
· Photosmart 5520
· TB-5300 Slimline Design Tablet

New Forum Topics
· Dale
by: Dale Blinco
on: 2018-02-05 00:26
1 replies, 1228 views

· modem driver needed
by: jongiffen777
on: 2017-12-13 11:11
1 replies, 2413 views

· Need a decent browser for XP Pro!
by: percy
on: 2017-12-05 11:02
2 replies, 4295 views

· Comodo Time Machine + Faronics Deep Freeze
by: Jabberwocky
on: 2017-11-15 23:17
1 replies, 2899 views

· Linux compatablity
by: ibme
on: 2017-10-04 18:05
1 replies, 4815 views

News Channels
· Drivers
· Guides
· Reviews
· Security
· Software
· Press Release
· Updates
· Interviews
· Linux
· General
· Debian
· Red Hat
· Slackware
· Gentoo
· Mandriva
· White Box
· SUSE
· GNOME
· KDE
· CentOS
· Ubuntu
· MEPIS
· Android
· Oracle Linux
· Arch Linux

What's New
Login to see an overview of all news stories since your last visit.

Welcome to our website

To take full advantage of all features you need to login or register. Registration is completely free and takes only a few seconds.

Linux Compatible » News » May 2004 » GLSA 200405-12: CVS heap overflow vulnerability

GLSA 200405-12: CVS heap overflow vulnerability

Posted by Philipp Esselbach on: 05/21/2004 01:19 AM [ Print | 0 comment(s) ]

A CVS update is available for Gentoo Linux

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: CVS heap overflow vulnerability
Date: May 20, 2004
Bugs: #51460
ID: 200405-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=======

CVS is subject to a heap overflow vulnerability allowing source repository compromise.




Background
=========

CVS (Concurrent Versions System) is an open-source network-transparent version control system. It contains both a client utility and a server.

Affected packages
================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-util/cvs <= 1.11.15 >= 1.11.16

Description
==========

Stefan Esser discovered a heap overflow in the CVS server, which can be triggered by sending malicious "Entry" lines and manipulating the flags related to that Entry. This vulnerability was proven to be exploitable.

Impact
=====

A remote attacker can execute arbitrary code on the CVS server, with the rights of the CVS server. By default, Gentoo uses the "cvs" user to run the CVS server. In particular, this flaw allows a complete compromise of CVS source repositories. If you're not running a server, then you are not vulnerable.

Workaround
=========

There is no known workaround at this time. All users are advised to upgrade to the latest available version of CVS.

Resolution
=========

All users running a CVS server should upgrade to the latest stable version:

# emerge sync

# emerge -pv ">=dev-util/cvs-1.11.16"
# emerge ">=dev-util/cvs-1.11.16"

References
=========

[ 1 ] E-matters advisory 07/2004
http://security.e-matters.de/advisories/072004.html
[ 2 ] CAN-2004-0396
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396

Availability
===========

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200405-12.xml

Concerns?
========

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License
======

Copyright 2004 Gentoo Technologies, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/1.0


Bookmark and Share

« Beginners Guides: Diagnosing Bad Hard Drives · GLSA 200405-13: neon heap-based buffer overflow »

Linux Compatible » News » May 2004 » GLSA 200405-12: CVS heap overflow vulnerability
All products mentioned are registered trademarks or trademarks of their respective owners.
© 2002-2018 Esselbach Internet Solutions - All Rights Reserved. Terms and privacy policy
Powered by Contentteller® Business Edition