SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CVS Vendors:   GNU [multiple authors]
(Fedora Issues Fix for FC1) CVS Entry Line Heap Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1010227
SecurityTracker URL:  http://securitytracker.com/id/1010227
CVE Reference:   CVE-2004-0396   (Links to External Site)
Date:  May 19 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.11.15-5
Description:   A heap overflow vulnerability was reported in Concurrent Versions System (CVS) in the processing of entry lines. A remote user can execute arbitrary code on the target system.

Stefan Esser of e-matters GmbH reported that the overflow occurs when an entry line is processed to determine if the modified and unchanged flags apply. A remote user can reportedly cause the flawed function to be called several times, inserting certain characters into the entry line and overwriting memory.

The vendor was reportedly notified on May 2, 2004.

The original advisory is available at:

http://security.e-matters.de/advisories/072004.html

Impact:   A remote user can execute arbitrary code on the target system with the privileges of the CVS server.
Solution:   Fedora has released a fix, available at:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

6de72febc153af0e5e8b1670372c767e SRPMS/cvs-1.11.15-5.src.rpm
0e70cb1a6940f6b2b7b71b64ada84e0a i386/cvs-1.11.15-5.i386.rpm
e7bb5244e9e067b6cc22b2f408ada206 i386/debug/cvs-debuginfo-1.11.15-5.i386.rpm
6dc5672173170e2a3b1a89a8f928364e x86_64/cvs-1.11.15-5.x86_64.rpm
e9ae30cfbc082e6e7f1a0ad8e0d0a37f x86_64/debug/cvs-debuginfo-1.11.15-5.x86_64.rpm

Vendor URL:  www.cvshome.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Fedora)
Underlying OS Comments:  FC1

Message History:   This archive entry is a follow-up to the message listed below.
May 19 2004 CVS Entry Line Heap Overflow Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [SECURITY] Fedora Core 1 Update: cvs-1.11.15-5



--===============0985284850==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="gKMricLos+KVdGMg"
Content-Disposition: inline


--gKMricLos+KVdGMg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-126
2004-05-19
---------------------------------------------------------------------

Product     : Fedora Core 1
Name        : cvs
Version     : 1.11.15                     =20
Release     : 5                 =20
Summary     : A version control system.
Description :
CVS (Concurrent Version System) is a version control system that can
record the history of your files (usually, but not always, source
code). CVS only stores the differences between versions, instead of
every version of every file you have ever created. CVS also keeps a log
of who, when, and why changes occurred.

CVS is very helpful for managing releases and controlling the
concurrent editing of source files among multiple authors. Instead of
providing version control for a collection of files in a single
directory, CVS provides version control for a hierarchical collection
of directories consisting of revision controlled files. These
directories and files can then be combined together to form a software
release.

---------------------------------------------------------------------
Update Information:

Stefan Esser discovered a flaw in cvs where malformed "Entry" lines
could cause a heap overflow. An attacker who has access to a CVS
server could use this flaw to execute arbitrary code under the UID
which the CVS server is executing. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0396
to this issue.

This update includes a patch by Derek Price, based on a patch by
Stefan Esser, which corrects this flaw.

---------------------------------------------------------------------
* Thu May 13 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-5

- use revised version of Stefan Esser's patch provided by Derek Robert Price

* Mon May 03 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-4

- rebuild

* Mon May 03 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-3

- add patch from Stefan Esser to close CAN-2004-0396

---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

6de72febc153af0e5e8b1670372c767e  SRPMS/cvs-1.11.15-5.src.rpm
0e70cb1a6940f6b2b7b71b64ada84e0a  i386/cvs-1.11.15-5.i386.rpm
e7bb5244e9e067b6cc22b2f408ada206  i386/debug/cvs-debuginfo-1.11.15-5.i386.r=
pm
6dc5672173170e2a3b1a89a8f928364e  x86_64/cvs-1.11.15-5.x86_64.rpm
e9ae30cfbc082e6e7f1a0ad8e0d0a37f  x86_64/debug/cvs-debuginfo-1.11.15-5.x86_=
64.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command. =20
---------------------------------------------------------------------


--gKMricLos+KVdGMg
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFAq4DmN5vOV3hoi/URAkYFAKCwU1alsNmn+eK4zxSuNtIp3R5xMwCgk8nG
7oE6R0eJC2rGuiVEa3WTCJo=
=UcSo
-----END PGP SIGNATURE-----

--gKMricLos+KVdGMg--



--===============0985284850==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

--===============0985284850==--


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC