7.5
CVSSv2

CVE-2005-0753

Published: 18/04/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in CVS prior to 1.11.20 allows remote malicious users to execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

cvs cvs 1.10

cvs cvs 1.11.11

cvs cvs 1.11.14

cvs cvs 1.11.6

cvs cvs 1.10.6

cvs cvs 1.10.7

cvs cvs 1.11.15

cvs cvs 1.11.16

cvs cvs 1.11.1

cvs cvs 1.11.1_p1

cvs cvs 1.11.10

cvs cvs 1.11.4

cvs cvs 1.11.5

cvs cvs 1.10.8

cvs cvs 1.11

cvs cvs 1.11.2

cvs cvs 1.11.3

Vendor Advisories

Synopsis cvs security update Type/Severity Security Advisory: Moderate Topic An updated cvs package that fixes security bugs is now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description CVS (Concurrent Version System) is a ...
Alen Zukich discovered a buffer overflow in the processing of version and author information in the CVS client By tricking an user to connect to a malicious CVS server, an attacker could exploit this to execute arbitrary code with the privileges of the connecting user ...
Derek Price, the current maintainer of CVS, discovered a buffer overflow in the CVS server, that serves the popular Concurrent Versions System, which could lead to the execution of arbitrary code For the old stable distribution (woody) this problem has been fixed in version 1111p1debian-12 For the stable distribution (sarge) this problem has be ...

Github Repositories

1Introduction 11 What is buffer overflow? A buffer is a sequential memory segment that includes anything from a character string to an integer sequence When more data is put inside a fixed buffer than the buffer can manage, a buffer overflow or buffer overrun occurs The additional information, which needs to go anywhere, can overwriting or corrupting the data held in the sp