10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.933 High
EPSS
Percentile
99.1%
A number of vulnerabilities were discovered in CVS by
Stefan Esser, Sebastian Krahmer, and Derek Price.
Insufficient input validation while processing “Entry”
lines. (CVE-2004-0414)
A double-free resulting from erroneous state handling while
processing “Argumentx” commands. (CVE-2004-0416)
Integer overflow while processing “Max-dotdot” commands.
(CVE-2004-0417)
Erroneous handling of empty entries handled while processing
“Notify” commands. (CVE-2004-0418)
A format string bug while processing CVS wrappers.
Single-byte buffer underflows while processing configuration files
from CVSROOT.
Various other integer overflows.
Additionally, iDEFENSE reports an undocumented command-line
flag used in debugging does not perform input validation on
the given path names.
CVS servers (“cvs server” or :pserver: modes) are
affected by these vulnerabilities. They vary in impact
but include information disclosure (the iDEFENSE-reported
bug), denial-of-service (CVE-2004-0414, CVE-2004-0416,
CVE-2004-0417 and other bugs), or possibly arbitrary code
execution (CVE-2004-0418). In very special situations where
the attacker may somehow influence the contents of CVS
configuration files in CVSROOT, additional attacks may be
possible.
secunia.com/advisories/11817
secunia.com/advisories/12309
security.e-matters.de/advisories/092004.html
www.idefense.com/application/poi/display?id=130&type=vulnerabilities&flashstatus=false
www.osvdb.org/6830
www.osvdb.org/6831
www.osvdb.org/6832
www.osvdb.org/6833
www.osvdb.org/6834
www.osvdb.org/6835
www.osvdb.org/6836
ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.104