Lucene search

K
gentooGentoo FoundationGLSA-201701-44
HistoryJan 19, 2017 - 12:00 a.m.

CVS: Heap-based overflow

2017-01-1900:00:00
Gentoo Foundation
security.gentoo.org
28

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.8%

Background

CVS (Concurrent Versions System) is an open-source network-transparent version control system. It contains both a client utility and a server.

Description

A heap-based buffer overflow was discovered in the proxy_connect function in src/client.c in CVS.

Impact

An attacker, utilizing a remote HTTP proxy server, could cause a Denial of Service condition or possibly execute arbitrary code via a crafted HTTP response.

Workaround

There is no known workaround at this time.

Resolution

All CVS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-vcs/cvs-1.12.12-r11"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-vcs/cvs< 1.12.12-r11UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.8%