serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.
Link | Tags |
---|---|
http://www.debian.org/security/2004/dsa-519 | patch vendor advisory |
http://security.e-matters.de/advisories/092004.html | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11242 | vdb entry signature |
ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1003 | vdb entry signature |
http://marc.info/?l=bugtraq&m=108716553923643&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2004-233.html | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:058 | vendor advisory |
http://security.gentoo.org/glsa/glsa-200406-06.xml | vendor advisory |
ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc | vendor advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html | mailing list |