Lucene search

K

Debian Security Advisory DSA 422-1 (cvs)

🗓️ 17 Jan 2008 00:00:00Reported by Copyright (c) 2005 E-Soft Inc. http://www.securityspace.comType 
openvas
 openvas
🔗 plugins.openvas.org👁 13 Views

Debian Security Advisory DSA 422-1 addresses vulnerabilities in CVS. The update prevents unauthorized access to local users and fixes a bug in parsing module requests to prevent the creation of files outside the repository. Additionally, changes have been made to the umask used for 'cvs init' and 'cvs-makerepos' to prevent repositories from being created with group write permissions.

Show more
Related
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2003-0977
10 Dec 200305:00
cvelist
Debian CVE
CVE-2003-0977
5 Jan 200405:00
debiancve
Tenable Nessus
Mandrake Linux Security Advisory : cvs (MDKSA-2003:112-1)
31 Jul 200400:00
nessus
Tenable Nessus
CVS pserver Crafted Module Request Arbitrary File / Directory Creation
11 Dec 200300:00
nessus
Tenable Nessus
RHEL 2.1 / 3 : cvs (RHSA-2004:004)
6 Jul 200400:00
nessus
NVD
CVE-2003-0977
5 Jan 200405:00
nvd
OpenVAS
Gentoo Security Advisory GLSA 200312-04 (CVS)
24 Sep 200800:00
openvas
OpenVAS
Debian Security Advisory DSA 422-1 (cvs)
17 Jan 200800:00
openvas
OpenVAS
Gentoo Security Advisory GLSA 200312-04 (CVS)
24 Sep 200800:00
openvas
CVE
CVE-2003-0977
5 Jan 200405:00
cve
Rows per page
# OpenVAS Vulnerability Test
# $Id: deb_422_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 422-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

include("revisions-lib.inc");
tag_insight = "The account management of the CVS pserver (which is used to give remote
access to CVS repositories) uses a CVSROOT/passwd file in each
repository which contains the accounts and their authentication
information as well as the name of the local unix account to use when a
pserver account is used. Since CVS performed no checking on what unix
account was specified anyone who could modify the CVSROOT/passwd could
gain access to all local users on the CVS server, including root.

This has been fixed in upstream version 1.11.11 by preventing pserver
from running as root. For Debian this problem is solved in version
1.11.1p1debian-9 in two different ways:

* pserver is no longer allowed to use root to access repositories

* a new /etc/cvs-repouid is introduced which can be used by the system
administrator to override the unix account used to access a
repository. More information on this change can be found at
http://www.wiggy.net/code/cvs-repouid/

Additionally, CVS pserver had a bug in parsing module requests which
could be used to create files and directories outside a repository.
This has been fixed upstream in version 1.11.11 and Debian version
1.11.1p1debian-9 .

Finally, the umask used for 'cvs init' and 'cvs-makerepos' has been
changed to prevent repositories from being created with group write
permissions.";
tag_summary = "The remote host is missing an update to cvs
announced via advisory DSA 422-1.";

tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20422-1";

if(description)
{
 script_id(53679);
 script_version("$Revision: 6616 $");
 script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
 script_tag(name:"creation_date", value:"2008-01-17 22:41:51 +0100 (Thu, 17 Jan 2008)");
 script_cve_id("CVE-2003-0977");
 script_tag(name:"cvss_base", value:"7.5");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_name("Debian Security Advisory DSA 422-1 (cvs)");



 script_category(ACT_GATHER_INFO);

 script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
 script_family("Debian Local Security Checks");
 script_dependencies("gather-package-list.nasl");
 script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
 script_tag(name : "solution" , value : tag_solution);
 script_tag(name : "insight" , value : tag_insight);
 script_tag(name : "summary" , value : tag_summary);
 script_tag(name:"qod_type", value:"package");
 script_tag(name:"solution_type", value:"VendorFix");
 exit(0);
}

#
# The script code starts here
#

include("pkg-lib-deb.inc");

res = "";
report = "";
if ((res = isdpkgvuln(pkg:"cvs", ver:"1.11.1p1debian-9", rls:"DEB3.0")) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99); # Not vulnerable.
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo