Executive Summary

Informations
Name CVE-2003-0015 First vendor Publication 2003-02-07
Vendor Cve Last vendor Modification 2024-11-20

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Double-free vulnerability in CVS 1.11.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed Directory request, as demonstrated by bypassing write checks to execute Update-prog and Checkin-prog commands.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0015

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-415 Double Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 5

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 233-1 (cvs)
File : nvt/deb_233_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
3227 CVS Malformed Directory Request Double-free Privilege Escalation

CVS contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when a user with write access to the repository sends a malformed directory name and makes special use of the "update-prog" and "checkin-prog" commands to execute arbitrary code on the server with the privileges of the running CVS server. If CVSROOT/passwd has been left as writeable this results in a root compromise. This flaw may lead to a loss of Confidentiality, Integrity and/or Availability.

Snort® IPS/IDS

Date Description
2014-01-10 CVS invalid directory response
RuleID : 2011-community - Revision : 12 - Type : INDICATOR-COMPROMISE
2014-01-10 CVS invalid directory response
RuleID : 2011 - Revision : 12 - Type : INDICATOR-COMPROMISE
2014-01-10 CVS double free exploit attempt response
RuleID : 2010-community - Revision : 12 - Type : INDICATOR-COMPROMISE
2014-01-10 CVS double free exploit attempt response
RuleID : 2010 - Revision : 12 - Type : INDICATOR-COMPROMISE

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-233.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing a security update.
File : mandrake_MDKSA-2003-009.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2003_0007.nasl - Type : ACT_GATHER_INFO
2004-07-06 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2003-013.nasl - Type : ACT_GATHER_INFO
2003-03-14 Name : The remote revision control service has a privilege escalation vulnerability.
File : cvs_double_free.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html
http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdser...
http://marc.info/?l=bugtraq&m=104333092200589&w=2
http://marc.info/?l=bugtraq&m=104342550612736&w=2
http://marc.info/?l=bugtraq&m=104428571204468&w=2
http://marc.info/?l=bugtraq&m=104438807203491&w=2
http://rhn.redhat.com/errata/RHSA-2003-013.html
http://security.e-matters.de/advisories/012003.html
http://www.cert.org/advisories/CA-2003-02.html
http://www.ciac.org/ciac/bulletins/n-032.shtml
http://www.debian.org/security/2003/dsa-233
http://www.kb.cert.org/vuls/id/650937
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009
http://www.redhat.com/support/errata/RHSA-2003-012.html
http://www.securityfocus.com/bid/6650
https://exchange.xforce.ibmcloud.com/vulnerabilities/11108
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Date Informations
2024-11-28 23:23:35
  • Multiple Updates
2024-11-28 12:05:29
  • Multiple Updates
2024-08-02 12:02:26
  • Multiple Updates
2024-08-02 01:01:24
  • Multiple Updates
2024-02-02 01:02:13
  • Multiple Updates
2024-02-01 12:01:25
  • Multiple Updates
2023-09-05 12:02:07
  • Multiple Updates
2023-09-05 01:01:17
  • Multiple Updates
2023-09-02 12:02:08
  • Multiple Updates
2023-09-02 01:01:17
  • Multiple Updates
2023-08-12 12:02:35
  • Multiple Updates
2023-08-12 01:01:17
  • Multiple Updates
2023-08-11 12:02:13
  • Multiple Updates
2023-08-11 01:01:18
  • Multiple Updates
2023-08-06 12:02:02
  • Multiple Updates
2023-08-06 01:01:18
  • Multiple Updates
2023-08-04 12:02:06
  • Multiple Updates
2023-08-04 01:01:18
  • Multiple Updates
2023-07-14 12:02:05
  • Multiple Updates
2023-07-14 01:01:18
  • Multiple Updates
2023-03-29 01:02:03
  • Multiple Updates
2023-03-28 12:01:23
  • Multiple Updates
2022-10-11 12:01:51
  • Multiple Updates
2022-10-11 01:01:11
  • Multiple Updates
2021-05-04 12:01:56
  • Multiple Updates
2021-04-22 01:02:06
  • Multiple Updates
2020-05-23 00:15:20
  • Multiple Updates
2019-03-19 12:01:35
  • Multiple Updates
2018-05-03 09:19:25
  • Multiple Updates
2016-10-18 12:01:08
  • Multiple Updates
2016-10-06 17:23:46
  • Multiple Updates
2014-02-17 10:25:42
  • Multiple Updates
2014-01-19 21:21:53
  • Multiple Updates
2013-05-11 11:50:04
  • Multiple Updates