SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CVS Vendors:   GNU [multiple authors]
(Fedora Issues Fix for FC2) CVS Entry Line Heap Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1010231
SecurityTracker URL:  http://securitytracker.com/id/1010231
CVE Reference:   CVE-2004-0396   (Links to External Site)
Date:  May 20 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.11.15-6
Description:   A heap overflow vulnerability was reported in Concurrent Versions System (CVS) in the processing of entry lines. A remote user can execute arbitrary code on the target system.

Stefan Esser of e-matters GmbH reported that the overflow occurs when an entry line is processed to determine if the modified and unchanged flags apply. A remote user can reportedly cause the flawed function to be called several times, inserting certain characters into the entry line and overwriting memory.

The vendor was reportedly notified on May 2, 2004.

The original advisory is available at:

http://security.e-matters.de/advisories/072004.html

Impact:   A remote user can execute arbitrary code on the target system with the privileges of the CVS server.
Solution:   Fedora has released a fix, available at:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

e4e908430953b43fcd8543b4cf3ba123 SRPMS/cvs-1.11.15-6.src.rpm
a05f5a97fa3e6b9a51eba6f418b51092 i386/cvs-1.11.15-6.i386.rpm
8484fea6acfc241e351a16ad9199db47 i386/debug/cvs-debuginfo-1.11.15-6.i386.rpm
727d6b8fa0bd49ef2c9bbe4cf3205250 x86_64/cvs-1.11.15-6.x86_64.rpm
b7ad37eee7739318c78985d2b598f878 x86_64/debug/cvs-debuginfo-1.11.15-6.x86_64.rpm

Vendor URL:  www.cvshome.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Fedora)
Underlying OS Comments:  FC2

Message History:   This archive entry is a follow-up to the message listed below.
May 19 2004 CVS Entry Line Heap Overflow Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [SECURITY] Fedora Core 2 Update: cvs-1.11.15-6



--===============1185295447==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="1LKvkjL3sHcu1TtY"
Content-Disposition: inline


--1LKvkjL3sHcu1TtY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-131
2004-05-19
---------------------------------------------------------------------

Product     : Fedora Core 2
Name        : cvs
Version     : 1.11.15                     =20
Release     : 6                 =20
Summary     : A version control system.
Description :
CVS (Concurrent Version System) is a version control system that can
record the history of your files (usually, but not always, source
code). CVS only stores the differences between versions, instead of
every version of every file you have ever created. CVS also keeps a log
of who, when, and why changes occurred.

CVS is very helpful for managing releases and controlling the
concurrent editing of source files among multiple authors. Instead of
providing version control for a collection of files in a single
directory, CVS provides version control for a hierarchical collection
of directories consisting of revision controlled files. These
directories and files can then be combined together to form a software
release.

---------------------------------------------------------------------
Update Information:

Stefan Esser discovered a flaw in cvs where malformed "Entry" lines
could cause a heap overflow. An attacker who has access to a CVS
server could use this flaw to execute arbitrary code under the UID
which the CVS server is executing. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0396
to this issue.

This update includes a patch by Derek Price, based on a patch by
Stefan Esser, which corrects this flaw.

---------------------------------------------------------------------
* Tue May 18 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-6

- rebuild

* Thu May 13 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-5

- use revised version of Stefan Esser's patch provided by Derek Robert Price

* Mon May 03 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-4

- rebuild

* Mon May 03 2004 Nalin Dahyabhai <nalin@redhat.com> 1.11.15-3

- add patch from Stefan Esser to close CAN-2004-0396

---------------------------------------------------------------------
This update can be downloaded from:
  http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

e4e908430953b43fcd8543b4cf3ba123  SRPMS/cvs-1.11.15-6.src.rpm
a05f5a97fa3e6b9a51eba6f418b51092  i386/cvs-1.11.15-6.i386.rpm
8484fea6acfc241e351a16ad9199db47  i386/debug/cvs-debuginfo-1.11.15-6.i386.r=
pm
727d6b8fa0bd49ef2c9bbe4cf3205250  x86_64/cvs-1.11.15-6.x86_64.rpm
b7ad37eee7739318c78985d2b598f878  x86_64/debug/cvs-debuginfo-1.11.15-6.x86_=
64.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command. =20
---------------------------------------------------------------------


--1LKvkjL3sHcu1TtY
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFAq4EIN5vOV3hoi/URAt71AKCKbkNMRo46BRawgfXjobphH0qWZwCgwur2
t4gSLyIGUT9IMrFffN+Z+eo=
=Utq+
-----END PGP SIGNATURE-----

--1LKvkjL3sHcu1TtY--



--===============1185295447==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

--===============1185295447==--



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC