10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.007 Low
EPSS
Percentile
81.0%
CentOS Errata and Security Advisory CESA-2012:0321
Concurrent Version System (CVS) is a version control system that can record
the history of your files.
A heap-based buffer overflow flaw was found in the way the CVS client
handled responses from HTTP proxies. A malicious HTTP proxy could use this
flaw to cause the CVS client to crash or, possibly, execute arbitrary code
with the privileges of the user running the CVS client. (CVE-2012-0804)
All users of cvs are advised to upgrade to these updated packages, which
contain a patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-February/080615.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-January/026596.html
Affected packages:
cvs
cvs-inetd
Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0321
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | cvs | < 1.11.23-11.el6_2.1 | cvs-1.11.23-11.el6_2.1.i686.rpm |
CentOS | 6 | x86_64 | cvs | < 1.11.23-11.el6_2.1 | cvs-1.11.23-11.el6_2.1.x86_64.rpm |
CentOS | 5 | i386 | cvs | < 1.11.22-11.el5_8.1 | cvs-1.11.22-11.el5_8.1.i386.rpm |
CentOS | 5 | i386 | cvs-inetd | < 1.11.22-11.el5_8.1 | cvs-inetd-1.11.22-11.el5_8.1.i386.rpm |
CentOS | 5 | x86_64 | cvs | < 1.11.22-11.el5_8.1 | cvs-1.11.22-11.el5_8.1.x86_64.rpm |
CentOS | 5 | x86_64 | cvs-inetd | < 1.11.22-11.el5_8.1 | cvs-inetd-1.11.22-11.el5_8.1.x86_64.rpm |