![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.53679 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 422-1 (cvs) |
Summary: | The remote host is missing an update to cvs;announced via advisory DSA 422-1. |
Description: | Summary: The remote host is missing an update to cvs announced via advisory DSA 422-1. Vulnerability Insight: The account management of the CVS pserver (which is used to give remote access to CVS repositories) uses a CVSROOT/passwd file in each repository which contains the accounts and their authentication information as well as the name of the local unix account to use when a pserver account is used. Since CVS performed no checking on what unix account was specified anyone who could modify the CVSROOT/passwd could gain access to all local users on the CVS server, including root. This has been fixed in upstream version 1.11.11 by preventing pserver from running as root. For Debian this problem is solved in version 1.11.1p1debian-9 in two different ways: * pserver is no longer allowed to use root to access repositories * a new /etc/cvs-repouid is introduced which can be used by the system administrator to override the unix account used to access a repository. Additionally, CVS pserver had a bug in parsing module requests which could be used to create files and directories outside a repository. This has been fixed upstream in version 1.11.11 and Debian version 1.11.1p1debian-9. Finally, the umask used for 'cvs init' and 'cvs-makerepos' has been changed to prevent repositories from being created with group write permissions. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0977 Bugtraq: 20031217 [OpenPKG-SA-2003.052] OpenPKG Security Advisory (cvs) (Google Search) http://marc.info/?l=bugtraq&m=107168035515554&w=2 Bugtraq: 20040129 [FLSA-2004:1207] Updated cvs resolves security vulnerability (Google Search) http://marc.info/?l=bugtraq&m=107540163908129&w=2 Conectiva Linux advisory: CLA-2004:808 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000808 Debian Security Information: DSA-422 (Google Search) http://www.debian.org/security/2004/dsa-422 http://www.mandriva.com/security/advisories?name=MDKSA-2003:112 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11528 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A855 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A866 http://www.redhat.com/support/errata/RHSA-2004-003.html http://www.redhat.com/support/errata/RHSA-2004-004.html http://secunia.com/advisories/10601 SGI Security Advisory: 20040103-01-U ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc SGI Security Advisory: 20040202-01-U ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc XForce ISS Database: cvs-module-file-manipulation(13929) https://exchange.xforce.ibmcloud.com/vulnerabilities/13929 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |