Lucene search

K
gentooGentoo FoundationGLSA-200312-04
HistoryDec 08, 2003 - 12:00 a.m.

CVS: malformed module request vulnerability

2003-12-0800:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.3%

Background

CVS, which stands for Concurrent Versions System, is a client/server application which tracks changes to sets of files. It allows multiple users to work concurrently on files, and then merge their changes back into the main tree (which can be on a remote system). It also allows branching, or maintaining separate versions for files.

Description

Quote from ccvs.cvshome.org/servlets/NewsItemView?newsID=84: “Stable CVS 1.11.10 has been released. Stable releases contain only bug fixes from previous versions of CVS. This release fixes a security issue with no known exploits that could cause previous versions of CVS to attempt to create files and directories in the filesystem root. This release also fixes several issues relevant to case insensitive filesystems and some other bugs. We recommend this upgrade for all CVS clients and servers!”

Impact

Attempts to create files and directories outside the repository may be possible.

Workaround

There is no known workaround at this time.

Resolution

All Gentoo Linux machines with cvs installed should be updated to use dev-util/cvs-1.11.10 or higher:

 # emerge sync
 # emerge -pv '>=dev-util/cvs-1.11.10'
 # emerge '>=dev-util/cvs-1.11.10'
 # emerge clean
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/cvs<= 1.11.9UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.3%