Summary
The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-04:14.cvs.asc
Solution
Upgrade your system to the appropriate stable release or security branch dated after the correction date
https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-04:14.cvs.asc
Insight
The Concurrent Versions System (CVS) is a version control system. It may be used to access a repository locally, or to access a `remote repository' using a number of different methods. When accessing a remote repository, the target machine runs the CVS server to fulfill client requests.
A number of vulnerabilities were discovered in CVS by Stefan Esser, Sebastian Krahmer, and Derek Price.
. Insufficient input validation while processing Entry lines.
(CVE-2004-0414)
. A double-free resulting from erroneous state handling while processing Argumentx commands. (CVE-2004-0416)
. Integer overflow while processing Max-dotdot commands.
(CVE-2004-0417)
. Erroneous handling of empty entries handled while processing Notify commands. (CVE-2004-0418)
. A format string bug while processing CVS wrappers.
. Single-byte buffer underflows while processing configuration files from CVSROOT.
. Various other integer overflows.
Additionally, iDEFENSE reports an undocumented command-line flag used in debugging does not perform input validation on the given path names.
Severity
Classification
-
CVE CVE-2004-0414, CVE-2004-0778 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities