SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CVS Vendors:   GNU [multiple authors]
CVS pserver 'passwd' File May Let Local Users Run Code with Root Privileges
SecurityTracker Alert ID:  1008568
SecurityTracker URL:  http://securitytracker.com/id/1008568
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 29 2003
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.11.10 and prior versions
Description:   A vulnerability was reported in the CVS pserver. A local user with write access to the CVS password file may be able to execute arbitrary code with root privileges.

It is reported that a local user with write access to the $CVSROOT/CVSROOT/passwd file can cause pserver to run with root privileges, allowing the user to execute arbitrary code with root privileges.

Impact:   A local user with write access to the CVSROOT/passwd file can execute arbitrary code with root privileges.
Solution:   The vendor has released a fixed version (1.11.11), available at:

http://ccvs.cvshome.org/servlets/ProjectDownloadList

Vendor URL:  ccvs.cvshome.org/servlets/NewsItemView?newsID=88 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Dec 29 2003 (Gentoo Issues Fix) CVS pserver 'passwd' File May Let Local Users Run Code with Root Privileges
Gentoo has released a fix.



 Source Message Contents

Subject:  http://ccvs.cvshome.org/servlets/NewsItemView?newsID=88


http://ccvs.cvshome.org/servlets/NewsItemView?newsID=88

 > News Item:  ccvs    	
 >
 > 2003-12-18: Stable CVS Version 1.11.11 Released! (security update)
 >
 > Contributed by: Derek Price
 >
 > Stable CVS 1.11.11 has been released. Stable releases contain only bug fixes from
 > previous versions of CVS. This release adds code to the CVS server to prevent it from
 > continuing as root after a user login, as an extra failsafe against a compromise of the
 > CVSROOT/passwd file. Previously, any user with the ability to write the CVSROOT/passwd
 > file could execute arbitrary code as the root user on systems with CVS pserver access
 > enabled. We recommend this upgrade for all CVS servers!


http://ccvs.cvshome.org/servlets/ProjectDownloadList


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC