Lucene search

K
certCERTVU:327037
HistoryMay 05, 2005 - 12:00 a.m.

Debian CVS "pserver" remote access authentication bypass vulnerability

2005-05-0500:00:00
www.kb.cert.org
48

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.2%

Overview

Debian Concurrent Versions System (CVS) remote repositories using “pserver” with the cvs-repouid Debian patch are vulnerable to authentication bypass.

Description

CVS is a version control and source code maintenance system that is widely used by open-source software development projects.

The “pserver” is one method used to provide remote access to CVS repositories. Debian included a patch/enhancement, referred to as the cvs-repouid patch, to enhance security when using the “pserver” remote access method.

Using the pserver access method in conjunction with the Debian repouid patch, it is possible to bypass the password authentication mechanism and gain access to the repository in question. Debian states in their original security advisory that this vulnerability is Debian specific.


Impact

Attackers could obtain unauthorized remote access to a CVS repository and modify its contents.


Solution

Apply the patch

Debian reported that the vulnerability has been fixed in the:
stable distribution (woody) version 1.11.1p1debian-10.
unstable distribution (sid) version 1.12.9-11.

For more information see Debian’s security advisory available at:
<http://www.debian.org/security/2005/dsa-715&gt;


Vendor Information

327037

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Debian __ Affected

Updated: April 29, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Debain has released a security advisory about this vulnerability along with patch information. The advisroy is available at:

<http://www.debian.org/security/2005/dsa-715&gt;

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23327037 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Debian credits Maks Polunin and Alberto Garcia with independently discovering this issue. This vulnerability was reported in Debian advisory DSA-715-1.

This document was written by Robert Mead based on information from Debian.

Other Information

CVE IDs: CVE-2004-1342
Severity Metric: 10.55 Date Public:

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.2%