First published: Wed Oct 10 2012(Updated: )
Heap-based buffer overflow in the substr function in parsing.c in cgit 0.9.0.3 and earlier allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via an empty username in the "Author" field in a commit.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
cgit by Lars Hjemli | <=0.9.0.3 | |
cgit by Lars Hjemli | =0.1 | |
cgit by Lars Hjemli | =0.2 | |
cgit by Lars Hjemli | =0.3 | |
cgit by Lars Hjemli | =0.4 | |
cgit by Lars Hjemli | =0.5 | |
cgit by Lars Hjemli | =0.6 | |
cgit by Lars Hjemli | =0.6.1 | |
cgit by Lars Hjemli | =0.6.2 | |
cgit by Lars Hjemli | =0.6.3 | |
cgit by Lars Hjemli | =0.7 | |
cgit by Lars Hjemli | =0.7.1 | |
cgit by Lars Hjemli | =0.7.2 | |
cgit by Lars Hjemli | =0.8 | |
cgit by Lars Hjemli | =0.8.1 | |
cgit by Lars Hjemli | =0.8.1.1 | |
cgit by Lars Hjemli | =0.8.2 | |
cgit by Lars Hjemli | =0.8.2.1 | |
cgit by Lars Hjemli | =0.8.2.2 | |
cgit by Lars Hjemli | =0.8.3 | |
cgit by Lars Hjemli | =0.8.3.1 | |
cgit by Lars Hjemli | =0.8.3.2 | |
cgit by Lars Hjemli | =0.8.3.3 | |
cgit by Lars Hjemli | =0.8.3.4 | |
cgit by Lars Hjemli | =0.8.3.5 | |
cgit by Lars Hjemli | =0.9 | |
cgit by Lars Hjemli | =0.9.0.1 | |
cgit by Lars Hjemli | =0.9.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4465 is classified as a high severity vulnerability due to potential remote code execution and denial of service risk.
To fix CVE-2012-4465, upgrade to cgit version 0.9.0.4 or later.
CVE-2012-4465 affects all versions of cgit up to and including 0.9.0.3.
The impact of CVE-2012-4465 can lead to a crash and potentially allow the execution of arbitrary code by exploiting an empty username in the Author field.
Yes, CVE-2012-4465 can be exploited remotely by authenticated users.