Lucene search

K
centosCentOS ProjectCESA-2012:0321
HistoryFeb 22, 2012 - 2:28 p.m.

cvs security update

2012-02-2214:28:34
CentOS Project
lists.centos.org
49

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

81.0%

CentOS Errata and Security Advisory CESA-2012:0321

Concurrent Version System (CVS) is a version control system that can record
the history of your files.

A heap-based buffer overflow flaw was found in the way the CVS client
handled responses from HTTP proxies. A malicious HTTP proxy could use this
flaw to cause the CVS client to crash or, possibly, execute arbitrary code
with the privileges of the user running the CVS client. (CVE-2012-0804)

All users of cvs are advised to upgrade to these updated packages, which
contain a patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2012-February/080615.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-January/026596.html

Affected packages:
cvs
cvs-inetd

Upstream details at:
https://access.redhat.com/errata/RHSA-2012:0321

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

81.0%