CVE-2003-0977
CVSS7.5
发布时间 :2004-01-05 00:00:00
修订时间 :2016-10-17 22:38:42
NMCOS    

[原文]CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.


[CNNVD]CVS畸形请求系统ROOT文件建立漏洞(CNNVD-200401-005)

        
        Concurrent Versions System (CVS)是一款开放源代码的版本控制软件。
        CVS系统由于在处理部分类型请求时存在问题,远程攻击者可以利用这个漏洞在主机系统上的ROOT目录文件系统中建立文件。
        提交恶意的模块请求可使CVS服务程序在ROOT文件系统上建立目录或文件,目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:slackware:slackware_linux:9.1Slackware Linux 9.1
cpe:/a:cvs:cvs:1.11.4
cpe:/a:cvs:cvs:1.11.1_p1
cpe:/a:cvs:cvs:1.11.3
cpe:/o:slackware:slackware_linux:8.1Slackware Linux 8.1
cpe:/o:slackware:slackware_linux:9.0Slackware Linux 9.0
cpe:/a:cvs:cvs:1.11.2
cpe:/a:cvs:cvs:1.11.1
cpe:/a:cvs:cvs:1.10.8
cpe:/a:cvs:cvs:1.11
cpe:/a:cvs:cvs:1.10.7
cpe:/a:cvs:cvs:1.11.6
cpe:/a:cvs:cvs:1.11.5

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:866Red Hat Enterprise 3 CVS Server root Directory Access Vulnerability
oval:org.mitre.oval:def:855Red Hat CVS Server root Directory Access Vulnerability
oval:org.mitre.oval:def:11528CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0977
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0977
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200401-005
(官方数据源) CNNVD

- 其它链接及资源

ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc
(UNKNOWN)  SGI  20040103-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
(UNKNOWN)  SGI  20040202-01-U
http://ccvs.cvshome.org/servlets/NewsItemView?newsID=84&JServSessionIdservlets=8u3x1myav1
(PATCH)  CONFIRM  http://ccvs.cvshome.org/servlets/NewsItemView?newsID=84&JServSessionIdservlets=8u3x1myav1
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000808
(UNKNOWN)  CONECTIVA  CLA-2004:808
http://marc.info/?l=bugtraq&m=107168035515554&w=2
(UNKNOWN)  BUGTRAQ  20031217 [OpenPKG-SA-2003.052] OpenPKG Security Advisory (cvs)
http://marc.info/?l=bugtraq&m=107540163908129&w=2
(UNKNOWN)  BUGTRAQ  20040129 [FLSA-2004:1207] Updated cvs resolves security vulnerability
http://www.debian.org/security/2004/dsa-422
(VENDOR_ADVISORY)  DEBIAN  DSA-422
http://www.mandriva.com/security/advisories?name=MDKSA-2003:112
(UNKNOWN)  MANDRAKE  MDKSA-2003:112
http://www.redhat.com/support/errata/RHSA-2004-003.html
(UNKNOWN)  REDHAT  RHSA-2004:003
http://www.redhat.com/support/errata/RHSA-2004-004.html
(UNKNOWN)  REDHAT  RHSA-2004:004
http://xforce.iss.net/xforce/xfdb/13929
(VENDOR_ADVISORY)  XF  cvs-module-file-manipulation(13929)

- 漏洞信息

CVS畸形请求系统ROOT文件建立漏洞
高危 输入验证
2004-01-05 00:00:00 2005-10-20 00:00:00
远程  
        
        Concurrent Versions System (CVS)是一款开放源代码的版本控制软件。
        CVS系统由于在处理部分类型请求时存在问题,远程攻击者可以利用这个漏洞在主机系统上的ROOT目录文件系统中建立文件。
        提交恶意的模块请求可使CVS服务程序在ROOT文件系统上建立目录或文件,目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        CVS
        ---
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        CVS Upgrade cvs-1.11.10.tar.bz2
        
        http://ccvs.cvshome.org/servlets/ProjectDownloadList?action=download&dlID=384

        MandrakeSoft
        ------------
        MandrakeSoft已经为此发布了一个安全公告(MDKSA-2003:112-1)以及相应补丁:
        MDKSA-2003:112-1:Updated cvs packages fix malformed module request vulnerability
        链接:
        http://www.linux-mandrake.com/en/security/2003/2003-112.php

        补丁下载:
        Updated Packages:
        Mandrake Linux 9.1:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.1/RPMS/cvs-1.11.10-0.2.91mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.1/SRPMS/cvs-1.11.10-0.2.91mdk.src.rpm
        Mandrake Linux 9.1/PPC:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/9.1/RPMS/cvs-1.11.10-0.2.91mdk.ppc.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/ppc/9.1/SRPMS/cvs-1.11.10-0.2.91mdk.src.rpm
        Mandrake Linux 9.2:
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/RPMS/cvs-1.11.10-0.2.92mdk.i586.rpm
        ftp://download.sourceforge.net/pub/mirrors/mandrake/updates/9.2/SRPMS/cvs-1.11.10-0.2.92mdk.src.rpm
        上述升级软件还可以在下列地址中的任意一个镜像ftp服务器上下载:
        
        http://www.mandrakesecure.net/en/ftp.php

- 漏洞信息

2941
CVS pserver Crafted Module Request Arbitrary File / Directory Creation

- 漏洞描述

CVS contains a flaw that allows a remote attacker to create arbitrary files and directories on a vulnerable server. This is due to CVS not checking attempts to create files or directories.

- 时间线

2003-12-09 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.11.10 or 1.12.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

CVS Malformed Request System Root File Creation Vulnerability
Input Validation Error 9178
Yes No
2003-12-09 12:00:00 2009-07-12 12:56:00
Vulnerability disclosed by Derek Price.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Workstation 6.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Turbolinux Server 6.5
Turbolinux Turbolinux Server 6.1
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux Advanced Server 6.0
Slackware Linux 9.1
Slackware Linux 9.0
Slackware Linux 8.1
SGI ProPack 2.4
SGI ProPack 2.3
RedHat cvs-1.11.2-10.i386.rpm
+ RedHat Linux 9.0 i386
CVS CVS 1.12.2
+ OpenPKG OpenPKG Current
CVS CVS 1.12.1
+ OpenPKG OpenPKG 1.3
CVS CVS 1.11.6
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
CVS CVS 1.11.5
+ OpenPKG OpenPKG 1.2
+ S.u.S.E. Linux Personal 8.2
CVS CVS 1.11.4
CVS CVS 1.11.3
CVS CVS 1.11.2
+ Mandriva Linux Mandrake 9.0
+ RedHat Linux 8.0 i386
+ RedHat Linux 8.0
+ Slackware Linux 8.1
CVS CVS 1.11.1 p1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ OpenBSD OpenBSD 3.5
+ OpenBSD OpenBSD 3.4
+ OpenBSD OpenBSD 3.3
+ OpenBSD OpenBSD 3.2
+ OpenBSD OpenBSD 3.1
+ Red Hat Linux 6.2
+ RedHat Linux 7.3 i386
+ RedHat Linux 7.3
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.2
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.1
+ RedHat Linux 7.0 sparc
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 7.0
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ Wirex Immunix OS 7.0
+ Wirex Immunix OS 7+
CVS CVS 1.11.1
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
CVS CVS 1.11
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1.1
+ Caldera OpenLinux Workstation 3.1
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
CVS CVS 1.10.8
+ Conectiva Linux 6.0
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 7.2
CVS CVS 1.10.7
+ Debian Linux 2.2 sparc
+ Debian Linux 2.2 powerpc
+ Debian Linux 2.2 IA-32
+ Debian Linux 2.2 arm
+ Debian Linux 2.2 alpha
+ Debian Linux 2.2 68k
+ Debian Linux 2.2
CVS CVS 1.10.6
CrossWind CyberScheduler 1.10.7
CVS CVS 1.11.10

- 不受影响的程序版本

CVS CVS 1.11.10

- 漏洞讨论

A problem has been discovered in the handling of some types of requests by CVS. Because of this, it may be possible for an attacker to create files in the root directory of a system hosting the vulnerable server.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Version 1.11.10 has been released to address this issue.

SGI has released an advisory 20040202-01-U to address this and other issues in SGI ProPack 2.4. Please see the referenced advisory for more information. Fixes are available below.

Red Hat has released security advisory RHSA-2004:003-01 and fixes to address this issue. See referenced advisory for additional details.

Gentoo has released an advisory (200312-04) to address this issue. All Gentoo Linux systems that have cvs installed should be updated to use cvs-1.11.10 or higher as follows:
emerge sync
emerge -pv '>=dev-util/cvs-1.11.10'
emerge '>=dev-util/cvs-1.11.10'
emerge clean

Mandrake has released security advisory MDKSA-2003:112-1 to address this issue as well as a problem in the updates included in MDKSA-2003:112. See referenced advisory for additional details.

Slackware has released security advisory SSA:2003-345-01 to address this issue. See referenced advisory for additional details.

OpenPKG has released security advisory OpenPKG-SA-2003.052 to address this issue. See referenced advisory for additional details.

TurboLinux has released advisory TLSA-2003-69 with fixes to address this issue.

Debian has released advisory DSA-422-1 with fixes to address this issue.

RedHat has released advisory RHSA-2004:003-04 with fixes to address this issue. Please see the web reference for more information.

Conectiva has issued advisory CLA-2004:808 to address this issue.

RedHat has released advisory RHSA-2004:004-05 with fixes to address this issue. Please see the web reference for more information.

SGI has released an advisory 20040103-01-U with fixes to address this and other issues. Please see the referenced advisory for more information.

RedHat has released an advisory FLSA:1207 with fixes to address this issue. Please see the referenced advisory for more information.

OpenBSD users are urged to follow the instructions contained in the patch files to update their CVS binaries.


RedHat cvs-1.11.2-10.i386.rpm

CVS CVS 1.10.6

CVS CVS 1.10.7

CrossWind CyberScheduler 1.10.7

CVS CVS 1.10.8

CVS CVS 1.11

CVS CVS 1.11.1 p1

CVS CVS 1.11.1

CVS CVS 1.11.2

CVS CVS 1.11.3

CVS CVS 1.11.4

CVS CVS 1.11.5

CVS CVS 1.11.6

SGI ProPack 2.3

SGI ProPack 2.4

Slackware Linux 8.1

Slackware Linux 9.0

Slackware Linux 9.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站