Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:CVS:DIR-OVERFLOW

Severity

Major

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

CVS Directory Heap Overflow

Release Date

2006/02/22

Update Number

1213

Supported Platforms

idp-4.1+, isg-3.5+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: CVS Directory Heap Overflow


This signature detects attempts to exploit a known vulnerability against the double free () function in Concurrent Versions System protocol. Attackers sending an over long directory name can cause a heap double free on some CVS systems.

Extended Description

CVS is prone to a double free vulnerability in the Directory requests. An attacker may potentially take advantage of this issue to cause heap memory to be corrupted with attacker-supplied values, which may result in execution of arbitrary code.

Affected Products

  • Cvs cvs 1.10.7
  • Cvs cvs 1.10.8
  • Cvs cvs 1.11.0
  • Cvs cvs 1.11.1
  • Cvs cvs 1.11.1 P1
  • Cvs cvs 1.11.2
  • Cvs cvs 1.11.3
  • Cvs cvs 1.11.4
  • Freebsd freebsd 4.4.0
  • Freebsd freebsd 4.5.0
  • Freebsd freebsd 4.6.0
  • Freebsd freebsd 4.7.0
  • Freebsd freebsd 5.0.0
  • Sun cobalt_cacheraq_3
  • Sun cobalt_cacheraq_4
  • Sun cobalt_qube_2
  • Sun cobalt_qube_3
  • Sun cobalt_raq_2
  • Sun cobalt_raq_3
  • Sun cobalt_raq_4
  • Sun cobalt_raq_550
  • Sun cobalt_raq_xtr
  • Sun linux 5.0.3

References

  • BugTraq: 6650
  • CVE: CVE-2003-0015
  • URL: http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html
  • URL: http://www.debian.org/security/2003/dsa-233
  • URL: http://www.cert.org/advisories/CA-2003-02.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out