what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2012-044

Mandriva Linux Security Advisory 2012-044
Posted Mar 30, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-044 - A vulnerability has been found and corrected in cvs. A heap-based buffer overflow flaw was found in the way the CVS client handled responses from HTTP proxies. A malicious HTTP proxy could use this flaw to cause the CVS client to crash or, possibly, execute arbitrary code with the privileges of the user running the CVS client. The updated packages have been patched to correct this issue.

tags | advisory, web, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2012-0804
SHA-256 | 891ba05686fa17391e069c49ba48e6a0ad5b0eba8fc97db8070e0ddf441eeff7

Mandriva Linux Security Advisory 2012-044

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:044
http://www.mandriva.com/security/
_______________________________________________________________________

Package : cvs
Date : March 29, 2012
Affected: 2010.1, 2011., Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in cvs:

A heap-based buffer overflow flaw was found in the way the CVS client
handled responses from HTTP proxies. A malicious HTTP proxy could
use this flaw to cause the CVS client to crash or, possibly, execute
arbitrary code with the privileges of the user running the CVS client
(CVE-2012-0804).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2010.1:
75eadafea0df6324db8e1036d32f52a7 2010.1/i586/cvs-1.12.13-18.1mdv2010.2.i586.rpm
11e671d1b1ef4938a1ea857b6bde2b8b 2010.1/SRPMS/cvs-1.12.13-18.1mdv2010.2.src.rpm

Mandriva Linux 2010.1/X86_64:
d2c2e13fb83f5e9548f5fc45e4a9416a 2010.1/x86_64/cvs-1.12.13-18.1mdv2010.2.x86_64.rpm
11e671d1b1ef4938a1ea857b6bde2b8b 2010.1/SRPMS/cvs-1.12.13-18.1mdv2010.2.src.rpm

Mandriva Linux 2011:
8f0aabdd69627ba79ff8c5506e5bbbd5 2011/i586/cvs-1.12.13-18.1-mdv2011.0.i586.rpm
cd6ef457350d4f25b762efcf613e95e4 2011/SRPMS/cvs-1.12.13-18.1.src.rpm

Mandriva Linux 2011/X86_64:
36a3b6d65bbbbf80ce2b949a2c906a2e 2011/x86_64/cvs-1.12.13-18.1-mdv2011.0.x86_64.rpm
cd6ef457350d4f25b762efcf613e95e4 2011/SRPMS/cvs-1.12.13-18.1.src.rpm

Mandriva Enterprise Server 5:
a883573ca234e76fd1179634034a41e4 mes5/i586/cvs-1.12.13-18.1mdvmes5.2.i586.rpm
ac4f289b966f7af566c921b7111f186c mes5/SRPMS/cvs-1.12.13-18.1mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
f27b646c50d6412f7d3e855d85b07abb mes5/x86_64/cvs-1.12.13-18.1mdvmes5.2.x86_64.rpm
ac4f289b966f7af566c921b7111f186c mes5/SRPMS/cvs-1.12.13-18.1mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFPdBeZmqjQ0CJFipgRAgF1AKDf/v3sGgDmbj3HiUuDO5JaDJS3TgCg7UIc
LJvfJkrvUExhZxyrvXboNEg=
=AYEA
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close