APP: CVS Excessive Max-dotdot Argument
This signature detects attempts to exploit a vulnerability in Concurrent Versions Systems (CVS). CVS versions 1.11.15 and earlier are vulnerable. Attackers can send excessively large "Max-dotdot" arguments to the CVS server to crash the server, or perform a directory traversal attack against the CVS client.
Extended Description
CVS is prone to multiple vulnerabilities. The issues include a double free vulnerability, format string vulnerabilities, and integer overflows. There is also a null termination issue in the security patch for BID 10384, potentially leading to a server crash. Some of these issues may be leveraged to execute arbitrary code, while other issues may only result in a denial of service.
Affected Products
Freebsd freebsd
srx-branch-19.3
vsrx3bsd-19.2
srx-19.4
vsrx3bsd-19.4
srx-branch-19.4
vsrx-19.4
vsrx-19.2
srx-19.3
srx-branch-12.3
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx-12.3
vmx-19.3
srx-12.3
Openbsd
Gentoo
Openpkg
Cvs
Sgi
Freebsd
5.0