Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
The account management of the CVS pserver (which is used to give remote
access to CVS repositories) uses a CVSROOT/passwd file in each
repository which contains the accounts and their authentication
information as well as the name of the local unix account to use when a
pserver account is used. Since CVS performed no checking on what unix
account was specified anyone who could modify the CVSROOT/passwd
could gain access to all local users on the CVS server, including root.
This has been fixed in upstream version 1.11.11 by preventing pserver
from running as root. For Debian this problem is solved in version
1.11.1p1debian-9 in two different ways:
Additionally, CVS pserver had a bug in parsing module requests which
could be used to create files and directories outside a repository.
This has been fixed upstream in version 1.11.11 and Debian version
Finally, the umask used for &ldquo
changed to prevent repositories from being created with group write
Solution : http://www.debian.org/security/2004/dsa-422
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi
|New Lot of 10 Genuine cisco DS-SFP-FC8G-SW 10-2418-02
|Cisco WS-3750-48TS-S V05 48 Port 10/100 w/ 4 SFP
|Finisar FTLF8528P2BCV-QL 8Gb SFP+ SW 150m for Qlogic QLE2562 Emulex EMC HP IBM
|HP X121 1G SFP LC SX TRANSCEIVER, J4858C, NEW SEALED, SEE PHOTOS
No Discussions have been posted on this vulnerability.