Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50320
Category:Fedora Local Security Checks
Title:Fedora Core 1 FEDORA-2004-126 (cvs)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to cvs
announced via advisory FEDORA-2004-126.

CVS (Concurrent Version System) is a version control system that can
record the history of your files (usually, but not always, source
code). CVS only stores the differences between versions, instead of
every version of every file you have ever created. CVS also keeps a log
of who, when, and why changes occurred.

CVS is very helpful for managing releases and controlling the
concurrent editing of source files among multiple authors. Instead of
providing version control for a collection of files in a single
directory, CVS provides version control for a hierarchical collection
of directories consisting of revision controlled files. These
directories and files can then be combined together to form a software
release.

Update Information:

Stefan Esser discovered a flaw in cvs where malformed 'Entry' lines
could cause a heap overflow. An attacker who has access to a CVS
server could use this flaw to execute arbitrary code under the UID
which the CVS server is executing. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0396
to this issue.

This update includes a patch by Derek Price, based on a patch by
Stefan Esser, which corrects this flaw.

* Thu May 13 2004 Nalin Dahyabhai 1.11.15-5

- use revised version of Stefan Esser's patch provided by Derek Robert Price

* Mon May 03 2004 Nalin Dahyabhai 1.11.15-4

- rebuild

* Mon May 03 2004 Nalin Dahyabhai 1.11.15-3

- add patch from Stefan Esser to close CVE-2004-0396

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

6de72febc153af0e5e8b1670372c767e SRPMS/cvs-1.11.15-5.src.rpm
0e70cb1a6940f6b2b7b71b64ada84e0a i386/cvs-1.11.15-5.i386.rpm
e7bb5244e9e067b6cc22b2f408ada206 i386/debug/cvs-debuginfo-1.11.15-5.i386.rpm
6dc5672173170e2a3b1a89a8f928364e x86_64/cvs-1.11.15-5.x86_64.rpm
e9ae30cfbc082e6e7f1a0ad8e0d0a37f x86_64/debug/cvs-debuginfo-1.11.15-5.x86_64.rpm

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-126.shtml

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 10384
Common Vulnerability Exposure (CVE) ID: CVE-2004-0396
http://www.securityfocus.com/bid/10384
Bugtraq: 20040519 Advisory 07/2004: CVS remote vulnerability (Google Search)
http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html
http://marc.info/?l=bugtraq&m=108498454829020&w=2
Bugtraq: 20040519 [OpenPKG-SA-2004.022] OpenPKG Security Advisory (cvs) (Google Search)
http://marc.info/?l=bugtraq&m=108500040719512&w=2
Cert/CC Advisory: TA04-147A
http://www.us-cert.gov/cas/techalerts/TA04-147A.html
CERT/CC vulnerability note: VU#192038
http://www.kb.cert.org/vuls/id/192038
Computer Incident Advisory Center Bulletin: O-147
http://www.ciac.org/ciac/bulletins/o-147.shtml
Debian Security Information: DSA-505 (Google Search)
http://www.debian.org/security/2004/dsa-505
http://marc.info/?l=bugtraq&m=108636445031613&w=2
FreeBSD Security Advisory: FreeBSD-SA-04:10
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html
http://security.gentoo.org/glsa/glsa-200405-12.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:048
http://security.e-matters.de/advisories/072004.html
NETBSD Security Advisory: NetBSD-SA2004-008
ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc
OpenBSD Security Advisory: 20040520 cvs server buffer overflow vulnerability
http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2
http://www.osvdb.org/6305
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970
http://www.redhat.com/support/errata/RHSA-2004-190.html
http://secunia.com/advisories/11641
http://secunia.com/advisories/11647
http://secunia.com/advisories/11651
http://secunia.com/advisories/11652
http://secunia.com/advisories/11674
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865
SuSE Security Announcement: SuSE-SA:2004:013 (Google Search)
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html
XForce ISS Database: cvs-entry-line-bo(16193)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16193
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.