First published: Tue Oct 12 2010(Updated: )
An array index error, leading to heap-based buffer overflow was found in the way CVS version control system applied certain delta fragments changes from input file in the RCS (Revision Control System file) format. A local attacker, with access to the system controlling the repository, could store a specially-crafted RCS file into the CVS repository and trick the remote user to checkout (update their CVS repository tree) with this file, which could lead to arbitrary code execution with the privileges of the CVS server process on the system hosting the CVS repository. References: [1] <a href="http://www.gnu.org/software/rcs/">http://www.gnu.org/software/rcs/</a> Upstream changeset: [2] <a href="http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev">http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev</a> Acknowledgements: Red Hat would like to thank Ralph Loader for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nongnu Cvs | =1.11.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3846 has been classified as a high severity vulnerability due to its potential for local code execution via heap-based buffer overflow.
To fix CVE-2010-3846, upgrade to a patched version of CVS that addresses this heap-based buffer overflow issue.
CVE-2010-3846 specifically affects CVS version 1.11.23.
CVE-2010-3846 requires local access to the system controlling the CVS repository for exploitation.
CVE-2010-3846 is an array index error that leads to a heap-based buffer overflow in the way CVS processes certain delta fragments.