Description
Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line.
Product(s):
- CVS CVS 1.10.7
- CVS CVS 1.10.8
- CVS CVS 1.11.10
- CVS CVS 1.11.11
- CVS CVS 1.11.14
- CVS CVS 1.11.15
- CVS CVS 1.11.16
- CVS CVS 1.11.1
- CVS CVS 1.11.1_p1
- CVS CVS 1.11.2
- CVS CVS 1.11.3
- CVS CVS 1.11.4
- CVS CVS 1.11.5
- CVS CVS 1.11.6
- CVS CVS 1.11
- CVS CVS 1.12.1
- CVS CVS 1.12.2
- CVS CVS 1.12.5
- CVS CVS 1.12.7
- CVS CVS 1.12.8
- OpenPKG 1.3
- OpenPKG 2.0
- OpenPKG OpenPKG Current
- SGI ProPack 2.4
- SGI ProPack 3.0
- FreeBSD 1.1.5.1
- FreeBSD 2.0.5
- FreeBSD 2.0
- FreeBSD 2.1.0
- FreeBSD 2.1.5
- FreeBSD 2.1.6.1
- FreeBSD 2.1.6
- FreeBSD 2.1.7.1
- FreeBSD 2.2.2
- FreeBSD 2.2.3
- FreeBSD 2.2.4
- FreeBSD 2.2.5
- FreeBSD 2.2.6
- FreeBSD 2.2.8
- FreeBSD 2.2
- FreeBSD 3.0
- FreeBSD 3.0 Releng
- FreeBSD 3.1
- FreeBSD 3.2
- FreeBSD 3.3
- FreeBSD 3.3 Release Candidate
- FreeBSD 3.4
- FreeBSD 3.5.1
- FreeBSD 3.5.1 Release
- FreeBSD 3.5.1 Stable
- FreeBSD 3.5
- FreeBSD 3.5 Stable
- FreeBSD 4.0
- FreeBSD 4.0 Alpha
- FreeBSD 4.0 Releng
- FreeBSD 4.1.1
- FreeBSD 4.1.1 Release
- FreeBSD 4.1.1 Stable
- FreeBSD 4.10
- FreeBSD 4.10 Patch 10
- FreeBSD 4.10 Patch 11
- FreeBSD 4.10 Patch 13
- FreeBSD 4.10 Patch 14
- FreeBSD 4.10 Patch 15
- FreeBSD 4.10 Patch 16
- FreeBSD 4.10 Patch 18
- FreeBSD 4.10 Patch 19
- FreeBSD 4.10 Patch 20
- FreeBSD 4.10 Patch 21
- FreeBSD 4.10 Patch 22
- FreeBSD 4.10 Patch 23
- FreeBSD 4.10 Patch 24
- FreeBSD 4.10 Patch 2
- FreeBSD 4.10 Patch 3
- FreeBSD 4.10 Patch 4
- FreeBSD 4.10 Patch 5
- FreeBSD 4.10 Patch 7
- FreeBSD 4.10 Patch 8
- FreeBSD 4.10 Patch 9
- FreeBSD 4.10 Release Candidate
- FreeBSD 4.10 Release
- FreeBSD 4.10 Releng
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.2 Stable
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.3 Release
- FreeBSD 4.3 Release P38
- FreeBSD 4.3 Releng
- FreeBSD 4.3 Stable
- +180 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1471, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1471 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.