Vulnerability Description
serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cvs | Cvs | 1.10.7 |
| Openpkg | Openpkg | All versions |
| Sgi | Propack | 2.4 |
| Gentoo | Linux | 1.4 |
| Openbsd | Openbsd | All versions |
References
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html
- http://marc.info/?l=bugtraq&m=108716553923643&w=2
- http://security.e-matters.de/advisories/092004.html
- http://security.gentoo.org/glsa/glsa-200406-06.xmlVendor Advisory
- http://www.debian.org/security/2004/dsa-519PatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:058
- http://www.redhat.com/support/errata/RHSA-2004-233.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html
- http://marc.info/?l=bugtraq&m=108716553923643&w=2
FAQ
What is CVE-2004-0418?
CVE-2004-0418 is a vulnerability with a CVSS score of 10.0 (HIGH). serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte...
How severe is CVE-2004-0418?
CVE-2004-0418 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0418?
Check the references section above for vendor advisories and patch information. Affected products include: Cvs Cvs, Openpkg Openpkg, Sgi Propack, Gentoo Linux, Openbsd Openbsd.