int(1531)

Boletines de Vulnerabilidades


Desbordamiento de búfer en CVS

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Obtener acceso
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio estandar

Información sobre el sistema

Propiedad Valor
Fabricante afectado GNU/Linux
Software afectado CVS <1.11.20
CVS <1.12.12

Descripción

Se ha descubierto una vulnerabilidad de desbordamiento de búfer en las versiones anteriores a la 1.11.20 y a la 1.12.12 de CVS.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto ejecutar código arbitrario.

Solución

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de software

CVS
CVS 1.11.20
CVS 1.12.12
https://ccvs.cvshome.org/servlets/ProjectDocumentList

SUSE Linux

SUSE Linux 9.3
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/cvs-1.12.11-4.2.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/cvs-1.12.11-4.2.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/cvs-1.12.11-4.2.src.rpm
x86-64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/cvs-1.12.11-4.2.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/cvs-1.12.11-4.2.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/src/cvs-1.12.11-4.2.src.rpm

SUSE Linux 9.2
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/cvs-1.12.9-2.2.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm
x86-64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/cvs-1.12.9-2.2.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/src/cvs-1.12.9-2.2.src.rpm

SUSE Linux 9.1
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cvs-1.11.14-24.10.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm
x86-64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cvs-1.11.14-24.10.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/cvs-1.11.14-24.10.src.rpm

SUSE Linux 9.0
x86
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cvs-1.11.6-85.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm
x86-64
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cvs-1.11.6-85.x86_64.patch.rpm
ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/cvs-1.11.6-85.src.rpm

SUSE Linux 8.2
x86
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cvs-1.11.5-116.i586.patch.rpm
ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/cvs-1.11.5-116.src.rpm

Mandriva Linux

Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/cvs-1.11.17-1.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/cvs-1.11.17-1.2.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/cvs-1.11.17-1.2.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/cvs-1.11.17-1.2.100mdk.src.rpm

Mandrakelinux 10.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/cvs-1.11.17-2.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/cvs-1.11.17-2.1.101mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/cvs-1.11.17-2.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/cvs-1.11.17-2.1.101mdk.src.rpm

Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/cvs-1.11.17-1.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/cvs-1.11.17-1.2.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/cvs-1.11.17-1.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/cvs-1.11.17-1.2.C21mdk.src.rpm

Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/cvs-1.11.17-1.2.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/cvs-1.11.17-1.2.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/cvs-1.11.17-1.2.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/cvs-1.11.17-1.2.C30mdk.src.rpm

Mandrivalinux LE2005
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/cvs-1.11.19-1.1.102mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/cvs-1.11.19-1.1.102mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/cvs-1.11.19-1.1.102mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/cvs-1.11.19-1.1.102mdk.src.rpm

FreeBSD
FreeBSD 4.10
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:05/cvs410.patch
FreeBSD 4.11
FreeBSD 5.3
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:05/cvs.patch

Red Hat Linux
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 Itanium Processor
https://rhn.redhat.com/

OpenBSD
OpenBSD 3.7
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/001_cvs.patch
OpenBSD 3.6
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.6/common/016_cvs.patch
OpenBSD 3.5
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/033_cvs4.patch

SUSE Linux
Actualizar mediante YaST Online Update

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12.dsc
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12.diff.gz
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_alpha.deb
ARM
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-12_sparc.deb

Debian Linux 3.1
AMD64
http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-11_amd64.deb

NetBSD

NetBSD 1.6, 1.6.1, 1.6.2, 2.0, 2.0.2
Instalar Parches o actualizar a NetBSD 2.1 o 2.0.3
http://www.netbsd.org

Identificadores estándar

Propiedad Valor
CVE CAN-2005-0753
BID

Recursos adicionales

Stable CVS Version 1.11.20 Released
https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=141

CVS Feature Version 1.12.12 Released
https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=142

SUSE Security Announcement SUSE-SA:2005:024
http://www.novell.com/linux/security/advisories/2005_24_cvs.html

Mandriva Security Advisories MDKSA-2005:073
http://www.mandriva.com/security/advisories?name=MDKSA-2005:073

FreeBSD Security Advisory FreeBSD-SA-05:05.cvs
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:05.cvs.asc

Red Hat Security Advisory RHSA-2005:387-06
https://rhn.redhat.com/errata/RHSA-2005-387.html

OpenBSD Security Advisory Apr 28, 2005
http://www.openbsd.org/security.html

SUSE Security Summary Report SUSE-SR:2005:012
http://www.novell.com/linux/security/advisories/2005_12_sr.html

OpenBSD Security Advisory June 7, 2005
http://www.openbsd.org/security.html

Debian Security Advisory DSA 742-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00127.html

Debian Security Advisory DSA 773-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00160.html

NetBSD Security Advisory (2005-006)
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-006.txt.asc

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2005-04-19
1.1 Aviso emitido por Mandriva (MDKSA-2005:073) 2005-04-22
1.2 Aviso emitido por FreeBSD (FreeBSD-SA-05:05.cvs) 2005-04-25
1.3 Aviso emitido por Red Hat (RHSA-2005:387-06) 2005-04-26
1.4 Aviso emitido por OpenBSD 2005-04-29
1.5 Aviso emitido por SUSE (SUSE-SR:2005:012) 2005-05-03
1.6 Aviso emitido por OpenBSD (June 7, 2005) 2005-06-08
1.7 Aviso emitido por Debian (DSA 742-1) 2005-07-08
1.8 Aviso emitido por Debian (DSA 773-1) 2005-08-24
1.9 Aviso emitido por NetBSD (2005-006) 2005-11-08

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT