First published: Fri Dec 31 2004(Updated: )
Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cvs Cvs | =1.10.7 | |
Cvs Cvs | =1.10.8 | |
Cvs Cvs | =1.11 | |
Cvs Cvs | =1.11.1 | |
Cvs Cvs | =1.11.1_p1 | |
Cvs Cvs | =1.11.2 | |
Cvs Cvs | =1.11.3 | |
Cvs Cvs | =1.11.4 | |
Cvs Cvs | =1.11.5 | |
Cvs Cvs | =1.11.6 | |
Cvs Cvs | =1.11.10 | |
Cvs Cvs | =1.11.11 | |
Cvs Cvs | =1.11.14 | |
Cvs Cvs | =1.11.15 | |
Cvs Cvs | =1.11.16 | |
Cvs Cvs | =1.12.1 | |
Cvs Cvs | =1.12.2 | |
Cvs Cvs | =1.12.5 | |
Cvs Cvs | =1.12.7 | |
Cvs Cvs | =1.12.8 | |
Openpkg Openpkg | =1.3 | |
Openpkg Openpkg | =2.0 | |
Openpkg Openpkg | =current | |
SGI ProPack | =2.4 | |
SGI ProPack | =3.0 | |
FreeBSD FreeBSD | =1.1.5.1 | |
FreeBSD FreeBSD | =2.0 | |
FreeBSD FreeBSD | =2.0.5 | |
FreeBSD FreeBSD | =2.1.0 | |
FreeBSD FreeBSD | =2.1.5 | |
FreeBSD FreeBSD | =2.1.6 | |
FreeBSD FreeBSD | =2.1.6.1 | |
FreeBSD FreeBSD | =2.1.7.1 | |
FreeBSD FreeBSD | =2.2 | |
FreeBSD FreeBSD | =2.2.2 | |
FreeBSD FreeBSD | =2.2.3 | |
FreeBSD FreeBSD | =2.2.4 | |
FreeBSD FreeBSD | =2.2.5 | |
FreeBSD FreeBSD | =2.2.6 | |
FreeBSD FreeBSD | =2.2.8 | |
FreeBSD FreeBSD | =3.0 | |
FreeBSD FreeBSD | =3.0-releng | |
FreeBSD FreeBSD | =3.1 | |
FreeBSD FreeBSD | =3.2 | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
FreeBSD FreeBSD | =3.5-stable | |
FreeBSD FreeBSD | =3.5.1 | |
FreeBSD FreeBSD | =3.5.1-release | |
FreeBSD FreeBSD | =3.5.1-stable | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =4.0-alpha | |
FreeBSD FreeBSD | =4.0-releng | |
FreeBSD FreeBSD | =4.1 | |
FreeBSD FreeBSD | =4.1.1 | |
FreeBSD FreeBSD | =4.1.1-release | |
FreeBSD FreeBSD | =4.1.1-stable | |
FreeBSD FreeBSD | =4.2 | |
FreeBSD FreeBSD | =4.2-stable | |
FreeBSD FreeBSD | =4.3 | |
FreeBSD FreeBSD | =4.3-release | |
FreeBSD FreeBSD | =4.3-release_p38 | |
FreeBSD FreeBSD | =4.3-releng | |
FreeBSD FreeBSD | =4.3-stable | |
FreeBSD FreeBSD | =4.4 | |
FreeBSD FreeBSD | =4.4-release_p42 | |
FreeBSD FreeBSD | =4.4-releng | |
FreeBSD FreeBSD | =4.4-stable | |
FreeBSD FreeBSD | =4.5 | |
FreeBSD FreeBSD | =4.5-release | |
FreeBSD FreeBSD | =4.5-release_p32 | |
FreeBSD FreeBSD | =4.5-releng | |
FreeBSD FreeBSD | =4.5-stable | |
FreeBSD FreeBSD | =4.6 | |
FreeBSD FreeBSD | =4.6-release | |
FreeBSD FreeBSD | =4.6-release_p20 | |
FreeBSD FreeBSD | =4.6-releng | |
FreeBSD FreeBSD | =4.6-stable | |
FreeBSD FreeBSD | =4.6.2 | |
FreeBSD FreeBSD | =4.7 | |
FreeBSD FreeBSD | =4.7-release | |
FreeBSD FreeBSD | =4.7-release_p17 | |
FreeBSD FreeBSD | =4.7-releng | |
FreeBSD FreeBSD | =4.7-stable | |
FreeBSD FreeBSD | =4.8 | |
FreeBSD FreeBSD | =4.8-pre-release | |
FreeBSD FreeBSD | =4.8-release_p6 | |
FreeBSD FreeBSD | =4.8-releng | |
FreeBSD FreeBSD | =4.9 | |
FreeBSD FreeBSD | =4.9-pre-release | |
FreeBSD FreeBSD | =4.9-releng | |
FreeBSD FreeBSD | =4.10 | |
FreeBSD FreeBSD | =4.10-release | |
FreeBSD FreeBSD | =4.10-releng | |
FreeBSD FreeBSD | =5.0 | |
FreeBSD FreeBSD | =5.0-alpha | |
FreeBSD FreeBSD | =5.0-release_p14 | |
FreeBSD FreeBSD | =5.0-releng | |
FreeBSD FreeBSD | =5.1 | |
FreeBSD FreeBSD | =5.1-alpha | |
FreeBSD FreeBSD | =5.1-release | |
FreeBSD FreeBSD | =5.1-release_p5 | |
FreeBSD FreeBSD | =5.1-releng | |
FreeBSD FreeBSD | =5.2 | |
FreeBSD FreeBSD | =5.2.1-release | |
FreeBSD FreeBSD | =5.2.1-releng | |
Gentoo Linux | =1.4 | |
Openbsd Openbsd | =3.4 | |
Openbsd Openbsd | =3.5 | |
Openbsd Openbsd | =current |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.