CVE-2010-3846

Array index error in the apply_rcs_change function in rcs.c in CVS 1.11.23 allows local users to gain privileges via an RCS file containing crafted delta fragment changes that trigger a heap-based buffer overflow.
References
Link Resource
http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050212.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050287.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050090.html
http://secunia.com/advisories/41079 Vendor Advisory
http://secunia.com/advisories/42041
http://secunia.com/advisories/42409
http://www.osvdb.org/68952
http://www.redhat.com/support/errata/RHSA-2010-0918.html
http://www.securityfocus.com/bid/44528
http://www.securitytracker.com/id?1024795
http://www.vupen.com/english/advisories/2010/2845 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/2846
http://www.vupen.com/english/advisories/2010/2869
http://www.vupen.com/english/advisories/2010/2899
http://www.vupen.com/english/advisories/2010/3080
https://bugzilla.redhat.com/show_bug.cgi?id=642146 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/62858
http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev Patch
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050212.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050287.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050090.html
http://secunia.com/advisories/41079 Vendor Advisory
http://secunia.com/advisories/42041
http://secunia.com/advisories/42409
http://www.osvdb.org/68952
http://www.redhat.com/support/errata/RHSA-2010-0918.html
http://www.securityfocus.com/bid/44528
http://www.securitytracker.com/id?1024795
http://www.vupen.com/english/advisories/2010/2845 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/2846
http://www.vupen.com/english/advisories/2010/2869
http://www.vupen.com/english/advisories/2010/2899
http://www.vupen.com/english/advisories/2010/3080
https://bugzilla.redhat.com/show_bug.cgi?id=642146 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/62858
Configurations

Configuration 1 (hide)

cpe:2.3:a:nongnu:cvs:1.11.23:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev - Patch () http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050212.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050212.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050287.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050287.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050090.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050090.html -
References () http://secunia.com/advisories/41079 - Vendor Advisory () http://secunia.com/advisories/41079 - Vendor Advisory
References () http://secunia.com/advisories/42041 - () http://secunia.com/advisories/42041 -
References () http://secunia.com/advisories/42409 - () http://secunia.com/advisories/42409 -
References () http://www.osvdb.org/68952 - () http://www.osvdb.org/68952 -
References () http://www.redhat.com/support/errata/RHSA-2010-0918.html - () http://www.redhat.com/support/errata/RHSA-2010-0918.html -
References () http://www.securityfocus.com/bid/44528 - () http://www.securityfocus.com/bid/44528 -
References () http://www.securitytracker.com/id?1024795 - () http://www.securitytracker.com/id?1024795 -
References () http://www.vupen.com/english/advisories/2010/2845 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/2845 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2846 - () http://www.vupen.com/english/advisories/2010/2846 -
References () http://www.vupen.com/english/advisories/2010/2869 - () http://www.vupen.com/english/advisories/2010/2869 -
References () http://www.vupen.com/english/advisories/2010/2899 - () http://www.vupen.com/english/advisories/2010/2899 -
References () http://www.vupen.com/english/advisories/2010/3080 - () http://www.vupen.com/english/advisories/2010/3080 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=642146 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=642146 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/62858 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/62858 -

Information

Published : 2010-11-05 17:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3846

Mitre link : CVE-2010-3846

CVE.ORG link : CVE-2010-3846


JSON object : View

Products Affected

nongnu

  • cvs
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer