|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:387|
The remote host is missing updates announced in
CVS (Concurrent Version System) is a version control system.
A buffer overflow bug was found in the way the CVS client processes version
and author information. If a user can be tricked into connecting to a
malicious CVS server, an attacker could execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-0753 to this issue.
Additionally, a bug was found in which CVS freed an invalid pointer.
However, this issue does not appear to be exploitable.
All users of cvs should upgrade to this updated package, which includes a
backported patch to correct these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
BugTraq ID: 13217|
Common Vulnerability Exposure (CVE) ID: CVE-2005-0753
Debian Security Information: DSA-742 (Google Search)
SuSE Security Announcement: SUSE-SA:2005:024 (Google Search)
XForce ISS Database: cvs-bo(20148)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.