CERTA-2005-AVI-374
Vulnerability from certfr_avis - Published: 2005-10-04 - Updated: 2005-10-04None
Description
Deux vulnérabilités ont été identifiées dans CVS. Ces vulnérabilités sont dues à des erreurs au niveau de la bibliothèque zlib (cf. avis du CERTA : CERTA-2005-AVI-276).
L'exploitation de ces deux vulnérabilités permettent à un utilisateur distant mal intentionné d'exécuter du code arbitraire ou de provoquer un déni de service.
Solution
La version 1.12.13 de CVS corrige ces vulnérabilités.
Concurent Versions System (CVS) version 1.12.12 et versions antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eConcurent Versions System (CVS) version 1.12.12 et versions ant\u00e9rieures.\u003c/p\u003e",
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans CVS. Ces vuln\u00e9rabilit\u00e9s\nsont dues \u00e0 des erreurs au niveau de la biblioth\u00e8que zlib (cf. avis du\nCERTA : CERTA-2005-AVI-276).\n\nL\u0027exploitation de ces deux vuln\u00e9rabilit\u00e9s permettent \u00e0 un utilisateur\ndistant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire ou de provoquer un\nd\u00e9ni de service.\n\n## Solution\n\nLa version 1.12.13 de CVS corrige ces vuln\u00e9rabilit\u00e9s.\n",
"cves": [],
"initial_release_date": "2005-10-04T00:00:00",
"last_revision_date": "2005-10-04T00:00:00",
"links": [
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 :",
"url": "http://www.nongnu.org/cvs/#TOCdownloading"
},
{
"title": "Site de l\u0027\u00e9diteur :",
"url": "http://www.nongnu.org/cvs/"
}
],
"reference": "CERTA-2005-AVI-374",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-10-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de CVS",
"vendor_advisories": [
{
"published_at": null,
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 de CVS",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…