Lucene search

K
centosCentOS ProjectCESA-2005:387
HistoryApr 26, 2005 - 1:42 p.m.

cvs security update

2005-04-2613:42:59
CentOS Project
lists.centos.org
49

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.848 High

EPSS

Percentile

98.5%

CentOS Errata and Security Advisory CESA-2005:387

CVS (Concurrent Version System) is a version control system.

A buffer overflow bug was found in the way the CVS client processes version
and author information. If a user can be tricked into connecting to a
malicious CVS server, an attacker could execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0753 to this issue.

Additionally, a bug was found in which CVS freed an invalid pointer.
However, this issue does not appear to be exploitable.

All users of cvs should upgrade to this updated package, which includes a
backported patch to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-April/073756.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073757.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073758.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073759.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073760.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073761.html

Affected packages:
cvs

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:387

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.848 High

EPSS

Percentile

98.5%