10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
80.8%
Issue Overview:
A heap-based buffer overflow flaw was found in the way the CVS client handled responses from HTTP proxies. A malicious HTTP proxy could use this flaw to cause the CVS client to crash or, possibly, execute arbitrary code with the privileges of the user running the CVS client. (CVE-2012-0804)
Affected Packages:
cvs
Issue Correction:
Run yum update cvs to update your system.
New Packages:
i686:
cvs-debuginfo-1.11.23-11.6.amzn1.i686
cvs-1.11.23-11.6.amzn1.i686
src:
cvs-1.11.23-11.6.amzn1.src
x86_64:
cvs-1.11.23-11.6.amzn1.x86_64
cvs-debuginfo-1.11.23-11.6.amzn1.x86_64
Red Hat: CVE-2012-0804
Mitre: CVE-2012-0804
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | cvs-debuginfo | < 1.11.23-11.6.amzn1 | cvs-debuginfo-1.11.23-11.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | cvs | < 1.11.23-11.6.amzn1 | cvs-1.11.23-11.6.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | cvs | < 1.11.23-11.6.amzn1 | cvs-1.11.23-11.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | cvs-debuginfo | < 1.11.23-11.6.amzn1 | cvs-debuginfo-1.11.23-11.6.amzn1.x86_64.rpm |