![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50320 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 1 FEDORA-2004-126 (cvs) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to cvs announced via advisory FEDORA-2004-126. CVS (Concurrent Version System) is a version control system that can record the history of your files (usually, but not always, source code). CVS only stores the differences between versions, instead of every version of every file you have ever created. CVS also keeps a log of who, when, and why changes occurred. CVS is very helpful for managing releases and controlling the concurrent editing of source files among multiple authors. Instead of providing version control for a collection of files in a single directory, CVS provides version control for a hierarchical collection of directories consisting of revision controlled files. These directories and files can then be combined together to form a software release. Update Information: Stefan Esser discovered a flaw in cvs where malformed 'Entry' lines could cause a heap overflow. An attacker who has access to a CVS server could use this flaw to execute arbitrary code under the UID which the CVS server is executing. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0396 to this issue. This update includes a patch by Derek Price, based on a patch by Stefan Esser, which corrects this flaw. * Thu May 13 2004 Nalin Dahyabhai - use revised version of Stefan Esser's patch provided by Derek Robert Price * Mon May 03 2004 Nalin Dahyabhai - rebuild * Mon May 03 2004 Nalin Dahyabhai - add patch from Stefan Esser to close CVE-2004-0396 This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/ 6de72febc153af0e5e8b1670372c767e SRPMS/cvs-1.11.15-5.src.rpm 0e70cb1a6940f6b2b7b71b64ada84e0a i386/cvs-1.11.15-5.i386.rpm e7bb5244e9e067b6cc22b2f408ada206 i386/debug/cvs-debuginfo-1.11.15-5.i386.rpm 6dc5672173170e2a3b1a89a8f928364e x86_64/cvs-1.11.15-5.x86_64.rpm e9ae30cfbc082e6e7f1a0ad8e0d0a37f x86_64/debug/cvs-debuginfo-1.11.15-5.x86_64.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-126.shtml Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
BugTraq ID: 10384 Common Vulnerability Exposure (CVE) ID: CVE-2004-0396 http://www.securityfocus.com/bid/10384 Bugtraq: 20040519 Advisory 07/2004: CVS remote vulnerability (Google Search) http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html http://marc.info/?l=bugtraq&m=108498454829020&w=2 Bugtraq: 20040519 [OpenPKG-SA-2004.022] OpenPKG Security Advisory (cvs) (Google Search) http://marc.info/?l=bugtraq&m=108500040719512&w=2 Cert/CC Advisory: TA04-147A http://www.us-cert.gov/cas/techalerts/TA04-147A.html CERT/CC vulnerability note: VU#192038 http://www.kb.cert.org/vuls/id/192038 Computer Incident Advisory Center Bulletin: O-147 http://www.ciac.org/ciac/bulletins/o-147.shtml Debian Security Information: DSA-505 (Google Search) http://www.debian.org/security/2004/dsa-505 http://marc.info/?l=bugtraq&m=108636445031613&w=2 FreeBSD Security Advisory: FreeBSD-SA-04:10 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html http://security.gentoo.org/glsa/glsa-200405-12.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:048 http://security.e-matters.de/advisories/072004.html NETBSD Security Advisory: NetBSD-SA2004-008 ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc OpenBSD Security Advisory: 20040520 cvs server buffer overflow vulnerability http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2 http://www.osvdb.org/6305 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970 http://www.redhat.com/support/errata/RHSA-2004-190.html http://secunia.com/advisories/11641 http://secunia.com/advisories/11647 http://secunia.com/advisories/11651 http://secunia.com/advisories/11652 http://secunia.com/advisories/11674 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865 SuSE Security Announcement: SuSE-SA:2004:013 (Google Search) http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html XForce ISS Database: cvs-entry-line-bo(16193) https://exchange.xforce.ibmcloud.com/vulnerabilities/16193 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |