Boletines de Vulnerabilidades |
Desbordamiento de búfer en CVS |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado |
CVS <1.11.20 CVS <1.12.12 |
Descripción |
|
Se ha descubierto una vulnerabilidad de desbordamiento de búfer en las versiones anteriores a la 1.11.20 y a la 1.12.12 de CVS. La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario. |
|
Solución |
|
Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo. Actualización de software CVS CVS 1.11.20 CVS 1.12.12 https://ccvs.cvshome.org/servlets/ProjectDocumentList SUSE Linux SUSE Linux 9.3 x86 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/cvs-1.12.11-4.2.i586.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/cvs-1.12.11-4.2.i586.patch.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/cvs-1.12.11-4.2.src.rpm x86-64 ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/cvs-1.12.11-4.2.x86_64.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/cvs-1.12.11-4.2.x86_64.patch.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/src/cvs-1.12.11-4.2.src.rpm SUSE Linux 9.2 x86 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.patch.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm x86-64 ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.patch.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm SUSE Linux 9.1 x86 ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.patch.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm x86-64 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.patch.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm SUSE Linux 9.0 x86 ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.patch.rpm ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm x86-64 ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.patch.rpm ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm SUSE Linux 8.2 x86 ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.rpm ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.patch.rpm ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/cvs-1.11.5-116.src.rpm Mandriva Linux Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/cvs-1.11.17-1.2.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/cvs-1.11.17-1.2.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/cvs-1.11.17-1.2.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/cvs-1.11.17-1.2.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/cvs-1.11.17-2.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/cvs-1.11.17-2.1.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/cvs-1.11.17-2.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/cvs-1.11.17-2.1.101mdk.src.rpm Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/cvs-1.11.17-1.2.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/cvs-1.11.17-1.2.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/cvs-1.11.17-1.2.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/cvs-1.11.17-1.2.C21mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/cvs-1.11.17-1.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/cvs-1.11.17-1.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/cvs-1.11.17-1.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/cvs-1.11.17-1.2.C30mdk.src.rpm Mandrivalinux LE2005 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/cvs-1.11.19-1.1.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/cvs-1.11.19-1.1.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/cvs-1.11.19-1.1.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/cvs-1.11.19-1.1.102mdk.src.rpm FreeBSD FreeBSD 4.10 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:05/cvs410.patch FreeBSD 4.11 FreeBSD 5.3 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:05/cvs.patch Red Hat Linux Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) Red Hat Linux Advanced Workstation 2.1 Itanium Processor https://rhn.redhat.com/ OpenBSD OpenBSD 3.7 ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/001_cvs.patch OpenBSD 3.6 ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/016_cvs.patch OpenBSD 3.5 ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/033_cvs4.patch SUSE Linux Actualizar mediante YaST Online Update Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12.dsc http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12.diff.gz http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_alpha.deb ARM http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_ia64.deb HP Precision http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_sparc.deb Debian Linux 3.1 AMD64 http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-11_amd64.deb NetBSD NetBSD 1.6, 1.6.1, 1.6.2, 2.0, 2.0.2 Instalar Parches o actualizar a NetBSD 2.1 o 2.0.3 http://www.netbsd.org |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-0753 |
BID | |
Recursos adicionales |
|
Stable CVS Version 1.11.20 Released https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=141 CVS Feature Version 1.12.12 Released https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=142 SUSE Security Announcement SUSE-SA:2005:024 http://www.novell.com/linux/security/advisories/2005_24_cvs.html Mandriva Security Advisories MDKSA-2005:073 http://www.mandriva.com/security/advisories?name=MDKSA-2005:073 FreeBSD Security Advisory FreeBSD-SA-05:05.cvs ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc Red Hat Security Advisory RHSA-2005:387-06 https://rhn.redhat.com/errata/RHSA-2005-387.html OpenBSD Security Advisory Apr 28, 2005 http://www.openbsd.org/security.html SUSE Security Summary Report SUSE-SR:2005:012 http://www.novell.com/linux/security/advisories/2005_12_sr.html OpenBSD Security Advisory June 7, 2005 http://www.openbsd.org/security.html Debian Security Advisory DSA 742-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00127.html Debian Security Advisory DSA 773-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00160.html NetBSD Security Advisory (2005-006) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-006.txt.asc |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2005-04-19 |
1.1 | Aviso emitido por Mandriva (MDKSA-2005:073) | 2005-04-22 |
1.2 | Aviso emitido por FreeBSD (FreeBSD-SA-05:05.cvs) | 2005-04-25 |
1.3 | Aviso emitido por Red Hat (RHSA-2005:387-06) | 2005-04-26 |
1.4 | Aviso emitido por OpenBSD | 2005-04-29 |
1.5 | Aviso emitido por SUSE (SUSE-SR:2005:012) | 2005-05-03 |
1.6 | Aviso emitido por OpenBSD (June 7, 2005) | 2005-06-08 |
1.7 | Aviso emitido por Debian (DSA 742-1) | 2005-07-08 |
1.8 | Aviso emitido por Debian (DSA 773-1) | 2005-08-24 |
1.9 | Aviso emitido por NetBSD (2005-006) | 2005-11-08 |