Executive Summary
Summary | |
---|---|
Title | New cvsnt package fixes arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-2108 | First vendor Publication | 2010-09-14 |
Vendor | Debian | Last vendor Modification | 2010-09-14 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It has been discovered that in cvsnt, a multi-platform version of the original source code versioning system CVS, an error in the authentication code allows a malicious, unprivileged user, through the use of a specially crafted branch name, to gain write access to any module or directory, including CVSROOT itself. The attacker can then execute arbitrary code as root by modifying or adding administrative scripts in that directory. For the stable distribution (lenny), this problem has been fixed in version 2.5.03.2382-3.3+lenny1. We recommend that you upgrade your cvsnt package. |
Original Source
Url : http://www.debian.org/security/2010/dsa-2108 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12670 | |||
Oval ID: | oval:org.mitre.oval:def:12670 | ||
Title: | DSA-2108-1 cvsnt -- programming error | ||
Description: | It has been discovered that in cvsnt, a multi-platform version of the original source code versioning system CVS, an error in the authentication code allows a malicious, unprivileged user, through the use of a specially crafted branch name, to gain write access to any module or directory, including CVSROOT itself. The attacker can then execute arbitrary code as root by modifying or adding administrative scripts in that directory. For the stable distribution, this problem has been fixed in version 2.5.03.2382-3.3+lenny1. We recommend that you upgrade your cvsnt package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2108-1 CVE-2010-1326 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | cvsnt |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 5 |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-10 | Name : Debian Security Advisory DSA 2108-1 (cvsnt) File : nvt/deb_2108_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
68042 | CVSNT perms.cpp Permissions Check Bypass Crafted Branch Name ACL Arbitrary Co... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2108.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:29:40 |
|