First published: Tue Oct 12 2010(Updated: )
An array index error, leading to heap-based buffer overflow was found in the way CVS version control system applied certain delta fragments changes from input file in the RCS (Revision Control System file) format. A local attacker, with access to the system controlling the repository, could store a specially-crafted RCS file into the CVS repository and trick the remote user to checkout (update their CVS repository tree) with this file, which could lead to arbitrary code execution with the privileges of the CVS server process on the system hosting the CVS repository. References: [1] <a href="http://www.gnu.org/software/rcs/">http://www.gnu.org/software/rcs/</a> Upstream changeset: [2] <a href="http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev">http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev</a> Acknowledgements: Red Hat would like to thank Ralph Loader for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nongnu Cvs | =1.11.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.