APP: CVS Author Name Overflow
This signature detects attempts to exploit a known vulnerability against CVS versions prior to 1.11.20. A successful attack can lead to arbitrary malicious code execution within the context of the CVS server.
Extended Description
CVS is prone to unspecified buffer overflow, memory access vulnerabilities, and a NULL pointer dereference denial of service. It is conjectured that the issues may be leveraged by a remote authenticated user to disclose regions of the CVS process memory, and to corrupt CVS process memory. The two issues combined may lead to a remote attacker reliably executing arbitrary code in the context of the vulnerable process, although this is not confirmed. This BID will be updated as soon as further information is made available.
Affected Products
Freebsd freebsd
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Conectiva
Suse
Gentoo
Turbolinux
Cvs
Sgi
Peachtree
Freebsd
Ubuntu
Openbsd
Netbsd
Debian
7.5