7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.007 Low
EPSS
Percentile
79.2%
Debian Concurrent Versions System (CVS) remote repositories using “pserver” with the cvs-repouid Debian patch are vulnerable to authentication bypass.
CVS is a version control and source code maintenance system that is widely used by open-source software development projects.
The “pserver” is one method used to provide remote access to CVS repositories. Debian included a patch/enhancement, referred to as the cvs-repouid patch, to enhance security when using the “pserver” remote access method.
Using the pserver access method in conjunction with the Debian repouid patch, it is possible to bypass the password authentication mechanism and gain access to the repository in question. Debian states in their original security advisory that this vulnerability is Debian specific.
Attackers could obtain unauthorized remote access to a CVS repository and modify its contents.
Apply the patch
Debian reported that the vulnerability has been fixed in the:
stable distribution (woody) version 1.11.1p1debian-10.
unstable distribution (sid) version 1.12.9-11.
For more information see Debian’s security advisory available at:
<http://www.debian.org/security/2005/dsa-715>
327037
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: April 29, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Debain has released a security advisory about this vulnerability along with patch information. The advisroy is available at:
<http://www.debian.org/security/2005/dsa-715>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23327037 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Debian credits Maks Polunin and Alberto Garcia with independently discovering this issue. This vulnerability was reported in Debian advisory DSA-715-1.
This document was written by Robert Mead based on information from Debian.
CVE IDs: | CVE-2004-1342 |
---|---|
Severity Metric: | 10.55 Date Public: |