10
CVSSv2

CVE-2012-0804

Published: 29/05/2012 Updated: 13/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.

Vulnerable Product Search on Vulmon Subscribe to Product

cvs cvs 1.11

cvs cvs 1.12

Vendor Advisories

Synopsis Moderate: cvs security update Type/Severity Security Advisory: Moderate Topic Updated cvs packages that fix one security issue are now available forRed Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact A Common Vulnerability Sco ...
cvs could be made to crash or run programs as your login if it connected to a malicious proxy server ...
It was discovered that a malicious CVS server could cause a heap overflow in the CVS client, potentially allowing the server to execute arbitrary code on the client For the stable distribution (squeeze), this problem has been fixed in version 1:11213-12+squeeze1 For the unstable distribution (sid), this problem has been fixed in version 2:112 ...
A heap-based buffer overflow flaw was found in the way the CVS client handled responses from HTTP proxies A malicious HTTP proxy could use this flaw to cause the CVS client to crash or, possibly, execute arbitrary code with the privileges of the user running the CVS client (CVE-2012-0804) ...