The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a CVS commit action.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/1524 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/1524 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/1524 - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3Dhvou2daoebb.fsf%40serein.m17n.org - Exploit, Vendor Advisory |
Information
Published : 2000-10-20 04:00
Updated : 2024-11-20 23:33
NVD link : CVE-2000-0680
Mitre link : CVE-2000-0680
CVE.ORG link : CVE-2000-0680
JSON object : View
Products Affected
cvs
- cvs
CWE