CVE-2004-0396

Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.
References
Link Resource
ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html
http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html
http://marc.info/?l=bugtraq&m=108498454829020&w=2
http://marc.info/?l=bugtraq&m=108500040719512&w=2
http://marc.info/?l=bugtraq&m=108636445031613&w=2
http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2
http://secunia.com/advisories/11641
http://secunia.com/advisories/11647
http://secunia.com/advisories/11651
http://secunia.com/advisories/11652
http://secunia.com/advisories/11674
http://security.e-matters.de/advisories/072004.html
http://security.gentoo.org/glsa/glsa-200405-12.xml
http://www.ciac.org/ciac/bulletins/o-147.shtml
http://www.debian.org/security/2004/dsa-505 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/192038 Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:048
http://www.osvdb.org/6305
http://www.redhat.com/support/errata/RHSA-2004-190.html Patch Vendor Advisory
http://www.securityfocus.com/bid/10384
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865
http://www.us-cert.gov/cas/techalerts/TA04-147A.html US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/16193
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970
ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html
http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html
http://marc.info/?l=bugtraq&m=108498454829020&w=2
http://marc.info/?l=bugtraq&m=108500040719512&w=2
http://marc.info/?l=bugtraq&m=108636445031613&w=2
http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2
http://secunia.com/advisories/11641
http://secunia.com/advisories/11647
http://secunia.com/advisories/11651
http://secunia.com/advisories/11652
http://secunia.com/advisories/11674
http://security.e-matters.de/advisories/072004.html
http://security.gentoo.org/glsa/glsa-200405-12.xml
http://www.ciac.org/ciac/bulletins/o-147.shtml
http://www.debian.org/security/2004/dsa-505 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/192038 Patch Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2004:048
http://www.osvdb.org/6305
http://www.redhat.com/support/errata/RHSA-2004-190.html Patch Vendor Advisory
http://www.securityfocus.com/bid/10384
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865
http://www.us-cert.gov/cas/techalerts/TA04-147A.html US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/16193
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cvs:cvs:1.11:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.12:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc - () ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-008.txt.asc -
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc - () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:10.cvs.asc -
References () http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html - () http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0980.html -
References () http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html - () http://cert.uni-stuttgart.de/archive/bugtraq/2004/05/msg00219.html -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021742.html -
References () http://marc.info/?l=bugtraq&m=108498454829020&w=2 - () http://marc.info/?l=bugtraq&m=108498454829020&w=2 -
References () http://marc.info/?l=bugtraq&m=108500040719512&w=2 - () http://marc.info/?l=bugtraq&m=108500040719512&w=2 -
References () http://marc.info/?l=bugtraq&m=108636445031613&w=2 - () http://marc.info/?l=bugtraq&m=108636445031613&w=2 -
References () http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2 - () http://marc.info/?l=openbsd-security-announce&m=108508894405639&w=2 -
References () http://secunia.com/advisories/11641 - () http://secunia.com/advisories/11641 -
References () http://secunia.com/advisories/11647 - () http://secunia.com/advisories/11647 -
References () http://secunia.com/advisories/11651 - () http://secunia.com/advisories/11651 -
References () http://secunia.com/advisories/11652 - () http://secunia.com/advisories/11652 -
References () http://secunia.com/advisories/11674 - () http://secunia.com/advisories/11674 -
References () http://security.e-matters.de/advisories/072004.html - () http://security.e-matters.de/advisories/072004.html -
References () http://security.gentoo.org/glsa/glsa-200405-12.xml - () http://security.gentoo.org/glsa/glsa-200405-12.xml -
References () http://www.ciac.org/ciac/bulletins/o-147.shtml - () http://www.ciac.org/ciac/bulletins/o-147.shtml -
References () http://www.debian.org/security/2004/dsa-505 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-505 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/192038 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/192038 - Patch, Third Party Advisory, US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:048 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:048 -
References () http://www.osvdb.org/6305 - () http://www.osvdb.org/6305 -
References () http://www.redhat.com/support/errata/RHSA-2004-190.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-190.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10384 - () http://www.securityfocus.com/bid/10384 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.395865 -
References () http://www.us-cert.gov/cas/techalerts/TA04-147A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-147A.html - US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16193 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16193 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9058 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A970 -

Information

Published : 2004-06-14 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0396

Mitre link : CVE-2004-0396

CVE.ORG link : CVE-2004-0396


JSON object : View

Products Affected

cvs

  • cvs