Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 31 May 2002 08:50:03 -0700 (PDT)
From:      Makoto Matsushita <matusita@jp.FreeBSD.org>
To:        freebsd-bugs@FreeBSD.org
Subject:   Re: bin/38765: CVS Daemon Vulnerability in 1.11.1p1
Message-ID:  <200205311550.g4VFo3739248@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

The following reply was made to PR bin/38765; it has been noted by GNATS.

From: Makoto Matsushita <matusita@jp.FreeBSD.org>
To: Alex Dupre <sysadmin@alexdupre.com>
Cc: bug-followup@FreeBSD.org
Subject: Re: bin/38765: CVS Daemon Vulnerability in 1.11.1p1
Date: Sat, 01 Jun 2002 00:48:05 +0900

 sysadmin> Due to a boundry condition error, it may be possible for a
 sysadmin> local attacker to execute arbitrary code. The rcs.c file
 sysadmin> contains an off-by-one error that could result in an
 sysadmin> attacker overwriting portions of stack memory, and executing
 sysadmin> arbitrary code.
 
 Is this bug fixed *really* in cvs-1.11.2?  How did you confirm that?
 
 According to http://ccvs.cvshome.org/source/browse/ccvs/src/rcs.c, rev
 1.259 is the fix.  However, this change is occured *after* 1.11.2 was
 released.  And, cvs-1.11.1 doesn't have this code.  Sorry if I'm wrong.
 
 -- -
 Makoto `MAR' Matsushita

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205311550.g4VFo3739248>