GLSA-200406-06 : CVS: additional DoS and arbitrary code execution vulnerabilities

Critical Nessus Plugin ID 14517


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200406-06 (CVS: additional DoS and arbitrary code execution vulnerabilities)

A team audit of the CVS source code performed by Stefan Esser and Sebastian Krahmer resulted in the discovery of several remotely exploitable vulnerabilities including:
no-null-termination of 'Entry' lines error_prog_name 'double-free()' Argument integer overflow serve_notify() out of bounds writes Impact :

An attacker could use these vulnerabilities to cause a Denial of Service or execute arbitrary code with the permissions of the user running cvs.
Workaround :

There is no known workaround at this time. All users are advised to upgrade to the latest available version of CVS.


All CVS users should upgrade to the latest stable version:
# emerge sync # emerge -pv '>=dev-util/cvs-1.11.17' # emerge '>=dev-util/cvs-1.11.17'

See Also

Plugin Details

Severity: Critical

ID: 14517

File Name: gentoo_GLSA-200406-06.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2004/08/30

Modified: 2016/01/14

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:cvs, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2004/06/10

Vulnerability Publication Date: 2004/06/09

Reference Information

CVE: CVE-2004-0414, CVE-2004-0416, CVE-2004-0417, CVE-2004-0418

OSVDB: 6830, 6831, 6832, 6833, 6834, 6835, 6836

GLSA: 200406-06

CWE: 119