CVE-2003-0015

Double-free vulnerability in CVS 1.11.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed Directory request, as demonstrated by bypassing write checks to execute Update-prog and Checkin-prog commands.
References
Link Resource
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html
http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14 Broken Link
http://marc.info/?l=bugtraq&m=104333092200589&w=2
http://marc.info/?l=bugtraq&m=104342550612736&w=2
http://marc.info/?l=bugtraq&m=104428571204468&w=2
http://marc.info/?l=bugtraq&m=104438807203491&w=2
http://rhn.redhat.com/errata/RHSA-2003-013.html Patch Vendor Advisory
http://security.e-matters.de/advisories/012003.html Patch Vendor Advisory
http://www.cert.org/advisories/CA-2003-02.html US Government Resource
http://www.ciac.org/ciac/bulletins/n-032.shtml
http://www.debian.org/security/2003/dsa-233
http://www.kb.cert.org/vuls/id/650937 Third Party Advisory US Government Resource
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009
http://www.redhat.com/support/errata/RHSA-2003-012.html
http://www.securityfocus.com/bid/6650
https://exchange.xforce.ibmcloud.com/vulnerabilities/11108
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html
http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14 Broken Link
http://marc.info/?l=bugtraq&m=104333092200589&w=2
http://marc.info/?l=bugtraq&m=104342550612736&w=2
http://marc.info/?l=bugtraq&m=104428571204468&w=2
http://marc.info/?l=bugtraq&m=104438807203491&w=2
http://rhn.redhat.com/errata/RHSA-2003-013.html Patch Vendor Advisory
http://security.e-matters.de/advisories/012003.html Patch Vendor Advisory
http://www.cert.org/advisories/CA-2003-02.html US Government Resource
http://www.ciac.org/ciac/bulletins/n-032.shtml
http://www.debian.org/security/2003/dsa-233
http://www.kb.cert.org/vuls/id/650937 Third Party Advisory US Government Resource
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009
http://www.redhat.com/support/errata/RHSA-2003-012.html
http://www.securityfocus.com/bid/6650
https://exchange.xforce.ibmcloud.com/vulnerabilities/11108
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cvs:cvs:1.10.7:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.10.8:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11.1:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11.1p1:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11.3:*:*:*:*:*:*:*
cpe:2.3:a:cvs:cvs:1.11.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:43

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html - () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0028.html -
References () http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14 - Broken Link () http://ccvs.cvshome.org/servlets/NewsItemView?newsID=51&JServSessionIdservlets=5of2iuhr14 - Broken Link
References () http://marc.info/?l=bugtraq&m=104333092200589&w=2 - () http://marc.info/?l=bugtraq&m=104333092200589&w=2 -
References () http://marc.info/?l=bugtraq&m=104342550612736&w=2 - () http://marc.info/?l=bugtraq&m=104342550612736&w=2 -
References () http://marc.info/?l=bugtraq&m=104428571204468&w=2 - () http://marc.info/?l=bugtraq&m=104428571204468&w=2 -
References () http://marc.info/?l=bugtraq&m=104438807203491&w=2 - () http://marc.info/?l=bugtraq&m=104438807203491&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2003-013.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2003-013.html - Patch, Vendor Advisory
References () http://security.e-matters.de/advisories/012003.html - Patch, Vendor Advisory () http://security.e-matters.de/advisories/012003.html - Patch, Vendor Advisory
References () http://www.cert.org/advisories/CA-2003-02.html - US Government Resource () http://www.cert.org/advisories/CA-2003-02.html - US Government Resource
References () http://www.ciac.org/ciac/bulletins/n-032.shtml - () http://www.ciac.org/ciac/bulletins/n-032.shtml -
References () http://www.debian.org/security/2003/dsa-233 - () http://www.debian.org/security/2003/dsa-233 -
References () http://www.kb.cert.org/vuls/id/650937 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/650937 - Third Party Advisory, US Government Resource
References () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009 - () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:009 -
References () http://www.redhat.com/support/errata/RHSA-2003-012.html - () http://www.redhat.com/support/errata/RHSA-2003-012.html -
References () http://www.securityfocus.com/bid/6650 - () http://www.securityfocus.com/bid/6650 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11108 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/11108 -

Information

Published : 2003-02-07 05:00

Updated : 2024-11-20 23:43


NVD link : CVE-2003-0015

Mitre link : CVE-2003-0015

CVE.ORG link : CVE-2003-0015


JSON object : View

Products Affected

cvs

  • cvs

freebsd

  • freebsd
CWE
CWE-415

Double Free