This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Fedora Core host is missing a security update.
The client for CVS before 1.11.15 allows a remote malicious CVS server
to create arbitrary files using certain RCS diff files that use
absolute pathnames during checkouts or updates.
Updated packages were made available in April 2004 however the
original update notification email did not make it to
fedora-announce-list at that time.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected cvs and / or cvs-debuginfo packages.
Risk factor :
Family: Fedora Local Security Checks
Nessus Plugin ID: 13691 (fedora_2004-110.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now