How to Buy
This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200412-26
(ViewCVS: Information leak and XSS vulnerabilities)
The tar export functions in ViewCVS bypass the 'hide_cvsroot' and
'forbidden' settings and therefore expose information that should be
kept secret (CAN-2004-0915). Furthermore, some error messages in
ViewCVS do not filter user-provided information, making it vulnerable
to a cross-site scripting attack (CAN-2004-1062).
By using the tar export functions, a remote attacker could access
information that is configured as restricted. Through the use of a
malicious request, an attacker could also inject and execute malicious
script code, potentially compromising another user's browser.
There is no known workaround at this time.
See also :
All ViewCVS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/viewcvs-0.9.2_p20041207-r1'
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 16068 (gentoo_GLSA-200412-26.nasl)
Bugtraq ID: 12112
CVE ID: CVE-2004-0915CVE-2004-1062
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.