CERTA-2005-AVI-374
Vulnerability from certfr_avis

None

Description

Deux vulnérabilités ont été identifiées dans CVS. Ces vulnérabilités sont dues à des erreurs au niveau de la bibliothèque zlib (cf. avis du CERTA : CERTA-2005-AVI-276).

L'exploitation de ces deux vulnérabilités permettent à un utilisateur distant mal intentionné d'exécuter du code arbitraire ou de provoquer un déni de service.

Solution

La version 1.12.13 de CVS corrige ces vulnérabilités.

Concurent Versions System (CVS) version 1.12.12 et versions antérieures.

Impacted products
Vendor Product Description
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eConcurent Versions System (CVS) version  1.12.12 et versions ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans CVS. Ces vuln\u00e9rabilit\u00e9s\nsont dues \u00e0 des erreurs au niveau de la biblioth\u00e8que zlib (cf. avis du\nCERTA : CERTA-2005-AVI-276).\n\nL\u0027exploitation de ces deux vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur\ndistant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire ou de provoquer un\nd\u00e9ni de service.\n\n## Solution\n\nLa version 1.12.13 de CVS corrige ces vuln\u00e9rabilit\u00e9s.\n",
  "cves": [],
  "initial_release_date": "2005-10-04T00:00:00",
  "last_revision_date": "2005-10-04T00:00:00",
  "links": [
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 :",
      "url": "http://www.nongnu.org/cvs/#TOCdownloading"
    },
    {
      "title": "Site de l\u0027\u00e9diteur :",
      "url": "http://www.nongnu.org/cvs/"
    }
  ],
  "reference": "CERTA-2005-AVI-374",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-10-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 de CVS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 de CVS",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…