The CVS server in FreeBSD-SA-04:07.cvs.asc allows remote attackers to read sensitive information
Reporter | Title | Published | Views | Family All 39 |
---|---|---|---|---|
![]() | Gentoo Security Advisory GLSA 200404-13 (cvs) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: cvs+ipv6 | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Security Advisory (FreeBSD-SA-04:07.cvs.asc) | 4 Sep 200800:00 | – | openvas |
![]() | Slackware Advisory SSA:2004-108-02 cvs security update | 11 Sep 201200:00 | – | openvas |
![]() | Debian Security Advisory DSA 486-1 (cvs) | 17 Jan 200800:00 | – | openvas |
![]() | Slackware: Security Advisory (SSA:2004-108-02) | 10 Sep 201200:00 | – | openvas |
![]() | Debian Security Advisory DSA 486-1 (cvs) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200404-13 (cvs) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: cvs+ipv6 | 4 Sep 200800:00 | – | openvas |
![]() | Debian DSA-486-1 : cvs - several vulnerabilities | 29 Sep 200400:00 | – | nessus |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.52649");
script_version("2023-07-26T05:05:09+0000");
script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
script_cve_id("CVE-2004-0180");
script_tag(name:"cvss_base", value:"2.6");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:N/C:N/I:P/A:N");
script_name("FreeBSD Security Advisory (FreeBSD-SA-04:07.cvs.asc)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("FreeBSD Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdpatchlevel");
script_tag(name:"insight", value:"The Concurrent Versions System (CVS) is a version control system. It
may be used to access a repository locally, or to access a `remote
repository' using a number of different methods. When accessing a
remote repository, the target machine runs the CVS server to fulfill
client requests.
Two programming errors were discovered in which path names handled by
CVS were not properly validated. In one case, CVE-2004-0180, the CVS
client accepts absolute path names from the server when determining
which files to update. In another case, CVE-2004-0405, the CVS server
accepts relative path names from the client when determining which
files to transmit, including those containing references to parent
directories (`../').");
script_tag(name:"solution", value:"Upgrade your system to the appropriate stable release
or security branch dated after the correction date.");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:07.cvs.asc");
script_tag(name:"summary", value:"The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-04:07.cvs.asc");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-bsd.inc");
vuln = FALSE;
if(patchlevelcmp(rel:"5.2.1", patchlevel:"5")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"4.9", patchlevel:"5")<0) {
vuln = TRUE;
}
if(patchlevelcmp(rel:"4.8", patchlevel:"18")<0) {
vuln = TRUE;
}
if(vuln) {
security_message(port:0);
} else if (__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo