Lucene search

K
centosCentOS ProjectCESA-2005:387-06
HistoryApr 26, 2005 - 10:37 p.m.

cvs security update

2005-04-2622:37:03
CentOS Project
lists.centos.org
55

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.848 High

EPSS

Percentile

98.5%

CentOS Errata and Security Advisory CESA-2005:387-06

CVS (Concurrent Version System) is a version control system.

A buffer overflow bug was found in the way the CVS client processes version
and author information. If a user can be tricked into connecting to a
malicious CVS server, an attacker could execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0753 to this issue.

Additionally, a bug was found in which CVS freed an invalid pointer.
However, this issue does not appear to be exploitable.

All users of cvs should upgrade to this updated package, which includes a
backported patch to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-April/073772.html

Affected packages:
cvs

OSVersionArchitecturePackageVersionFilename
CentOS2i386cvs< 1.11.2-27cvs-1.11.2-27.i386.rpm

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.848 High

EPSS

Percentile

98.5%