Vulnerabilities > CVE-2005-0753 - Unspecified vulnerability in CVS
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 17 |
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2005-330.NASL description - Mon Apr 18 2005 Martin Stransky <stransky at redhat.com> 1.11.17-6.FC3 - add security fix CVE-2005-0753 (Derek Price) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 19654 published 2005-09-12 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19654 title Fedora Core 3 : cvs-1.11.17-6.FC3 (2005-330) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-773.NASL description This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well. last seen 2020-06-01 modified 2020-06-02 plugin id 57528 published 2012-01-12 reporter This script is Copyright (C) 2012-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57528 title Debian DSA-773-1 : amd64 - several vulnerabilities NASL family Misc. NASL id CVS_UNSPECIFIED_VULN.NASL description According to its version number, the remote CVS server has unspecified vulnerabilities. This includes a double free, and a buffer overflow. A remote attacker could exploit these to crash the server, or possibly execute arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 18097 published 2005-04-20 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18097 title CVS < 1.11.20 / 1.12.12 Multiple Unspecified Vulnerabilities NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2005-387.NASL description An updated cvs package that fixes security bugs is now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. CVS (Concurrent Version System) is a version control system. A buffer overflow bug was found in the way the CVS client processes version and author information. If a user can be tricked into connecting to a malicious CVS server, an attacker could execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0753 to this issue. Additionally, a bug was found in which CVS freed an invalid pointer. However, this issue does not appear to be exploitable. All users of cvs should upgrade to this updated package, which includes a backported patch to correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 21817 published 2006-07-03 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21817 title CentOS 3 / 4 : cvs (CESA-2005:387) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-117-1.NASL description Alen Zukich discovered a buffer overflow in the processing of version and author information in the CVS client. By tricking an user to connect to a malicious CVS server, an attacker could exploit this to execute arbitrary code with the privileges of the connecting user. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 20505 published 2006-01-15 reporter Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20505 title Ubuntu 4.10 / 5.04 : cvs vulnerability (USN-117-1) NASL family SuSE Local Security Checks NASL id SUSE_SA_2005_024.NASL description The remote host is missing the patch for the advisory SUSE-SA:2005:024 (cvs). The Concurrent Versions System (CVS) offers tools which allow developers to share and maintain large software projects. The current maintainer of CVS reported various problems within CVS such as a buffer overflow and memory access problems which have been fixed within the available updates. The CVE project has assigned the CAN number CVE-2005-0753. last seen 2020-06-01 modified 2020-06-02 plugin id 18082 published 2005-04-18 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18082 title SUSE-SA:2005:024: cvs NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-387.NASL description An updated cvs package that fixes security bugs is now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. CVS (Concurrent Version System) is a version control system. A buffer overflow bug was found in the way the CVS client processes version and author information. If a user can be tricked into connecting to a malicious CVS server, an attacker could execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0753 to this issue. Additionally, a bug was found in which CVS freed an invalid pointer. However, this issue does not appear to be exploitable. All users of cvs should upgrade to this updated package, which includes a backported patch to correct these issues. last seen 2020-06-01 modified 2020-06-02 plugin id 18130 published 2005-04-25 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18130 title RHEL 2.1 / 3 / 4 : cvs (RHSA-2005:387) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2005-111-01.NASL description New CVS packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 18804 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18804 title Slackware 10.0 / 10.1 / 8.1 / 9.0 / 9.1 / current : CVS (SSA:2005-111-01) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200504-16.NASL description The remote host is affected by the vulnerability described in GLSA-200504-16 (CVS: Multiple vulnerabilities) Alen Zukich has discovered several serious security issues in CVS, including at least one buffer overflow (CAN-2005-0753), memory leaks and a NULL pointer dereferencing error. Furthermore when launching trigger scripts CVS includes a user controlled directory. Impact : An attacker could exploit these vulnerabilities to cause a Denial of Service or execute arbitrary code with the permissions of the CVS pserver or the authenticated user (depending on the connection method used). Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 18088 published 2005-04-19 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18088 title GLSA-200504-16 : CVS: Multiple vulnerabilities NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2005-073.NASL description A buffer overflow and memory access problem in CVS have been discovered by the CVS maintainer. The updated packages have been patched to correct the problem. last seen 2020-06-01 modified 2020-06-02 plugin id 18103 published 2005-04-21 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18103 title Mandrake Linux Security Advisory : cvs (MDKSA-2005:073) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-742.NASL description Derek Price, the current maintainer of CVS, discovered a buffer overflow in the CVS server, that serves the popular Concurrent Versions System, which could lead to the execution of arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 18646 published 2005-07-08 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/18646 title Debian DSA-742-1 : cvs - buffer overflow
Oval
accepted | 2013-04-29T04:21:21.941-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code. | ||||||||||||||||||||
family | unix | ||||||||||||||||||||
id | oval:org.mitre.oval:def:9688 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||
title | Buffer overflow in CVS before 1.11.20 allows remote attackers to execute arbitrary code. | ||||||||||||||||||||
version | 26 |
Redhat
advisories |
| ||||
rpms |
|
References
- http://bugs.gentoo.org/attachment.cgi?id=54352&action=view
- http://secunia.com/advisories/14976/
- http://www.debian.org/security/2005/dsa-742
- http://www.gentoo.org/security/en/glsa/glsa-200504-16.xml
- http://www.novell.com/linux/security/advisories/2005_24_cvs.html
- http://www.redhat.com/support/errata/RHSA-2005-387.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20148
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9688