This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-03-29 07:54:42 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
d2102505-f03d-11d8-81b0-000347a4fa7d | cvs -- numerous vulnerabilities A number of vulnerabilities were discovered in CVS by Stefan Esser, Sebastian Krahmer, and Derek Price.
Additionally, iDEFENSE reports an undocumented command-line flag used in debugging does not perform input validation on the given path names. CVS servers ("cvs server" or :pserver: modes) are affected by these vulnerabilities. They vary in impact but include information disclosure (the iDEFENSE-reported bug), denial-of-service (CVE-2004-0414, CVE-2004-0416, CVE-2004-0417 and other bugs), or possibly arbitrary code execution (CVE-2004-0418). In very special situations where the attacker may somehow influence the contents of CVS configuration files in CVSROOT, additional attacks may be possible. Discovery 2004-05-20 Entry 2004-08-17 Modified 2004-09-19 cvs+ipv6 < 1.11.17 FreeBSD ge 5.2 lt 5.2.1_10 ge 4.10 lt 4.10_3 ge 4.9 lt 4.9_12 ge 4.8 lt 4.8_25 SA-04:14.cvs CVE-2004-0414 CVE-2004-0416 CVE-2004-0417 CVE-2004-0418 CVE-2004-0778 http://secunia.com/advisories/11817 http://secunia.com/advisories/12309 http://security.e-matters.de/advisories/092004.html http://www.idefense.com/application/poi/display?id=130&type=vulnerabilities&flashstatus=false https://ccvs.cvshome.org/source/browse/ccvs/NEWS?rev=1.116.2.104 http://www.osvdb.org/6830 http://www.osvdb.org/6831 http://www.osvdb.org/6832 http://www.osvdb.org/6833 http://www.osvdb.org/6834 http://www.osvdb.org/6835 http://www.osvdb.org/6836 10499 |
0792e7a7-8e37-11d8-90d1-0020ed76ef5a | CVS path validation errors Two programming errors were discovered in which path names handled by CVS were not properly validated. In one case, the CVS client accepts absolute path names from the server when determining which files to update. In another case, the CVS server accepts relative path names from the client when determining which files to transmit, including those containing references to parent directories (`../'). These programming errors generally only have a security impact when dealing with remote CVS repositories. A malicious CVS server may cause a CVS client to overwrite arbitrary files on the client's system. A CVS client may request RCS files from a remote system other than those in the repository specified by $CVSROOT. These RCS files need not be part of any CVS repository themselves. Discovery 2004-04-14 Entry 2004-04-14 Modified 2004-05-05 cvs+ipv6 le 1.11.5_1 FreeBSD ge 5.2 lt 5.2.1_5 ge 4.9 lt 4.9_5 ge 4.8 lt 4.8_18 CVE-2004-0180 CVE-2004-0405 http://ccvs.cvshome.org/servlets/NewsItemView?newsID=102 SA-04:07.cvs |
c5c17ead-8f23-11da-8c1d-000e0c2e438a | cvsbug -- race condition Problem description A temporary file is created, used, deleted, and then
re-created with the same name. This creates a window during
which an attacker could replace the file with a link to
another file. While cvsbug(1) is based on the send-pr(1)
utility, this problem does not exist in the version of
send-pr(1) distributed with FreeBSD. Impact A local attacker could cause data to be written to any file to which the user running cvsbug(1) (or send-pr(1) in FreeBSD 4.10 and 5.3) has write access. This may cause damage in itself (e.g., by destroying important system files or documents) or may be used to obtain elevated privileges. Workaround Do not use the cvsbug(1) utility on any system with untrusted
users. Discovery 2005-09-07 Entry 2006-01-27 Modified 2006-11-08 FreeBSD ge 5.4 lt 5.4_7 ge 5.3 lt 5.3_22 ge 4.11 lt 4.11_12 ge 4.10 lt 4.10_18 cvs+ipv6 < 1.11.17_1 CAN-2005-2693 SA-05:20.cvsbug |