{"vuid":"VU#327037","idnumber":"327037","name":"Debian CVS \"pserver\" remote access authentication bypass vulnerability","keywords":["cvs","repouid patch","authentication bypass","pserver access method"],"overview":"Debian Concurrent Versions System (CVS) remote repositories using \"pserver\" with the cvs-repouid Debian patch are vulnerable to authentication bypass.","clean_desc":"CVS is a version control and source code maintenance system that is widely used by open-source software development projects. The \"pserver\" is one method used to provide remote access to CVS repositories. Debian included a patch/enhancement, referred to as the cvs-repouid patch, to enhance security when using the \"pserver\" remote access method. Using the pserver access method in conjunction with the Debian repouid patch, it is possible to bypass the password authentication mechanism and gain access to the repository in question. Debian states in their original security advisory that this vulnerability is Debian specific.","impact":"Attackers could obtain unauthorized remote access to a CVS repository and modify its contents.","resolution":"Apply the patch Debian reported that the vulnerability has been fixed in the: stable distribution (woody) version 1.11.1p1debian-10. unstable distribution (sid) version 1.12.9-11. For more information see Debian's security advisory available at: http://www.debian.org/security/2005/dsa-715","workarounds":"","sysaffected":"","thanks":"Debian credits Maks Polunin and Alberto Garcia with independently discovering this issue. This vulnerability was reported in Debian advisory \nDSA-715-1","author":"This document was written by Robert Mead based on information from Debian.","public":["http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00097.html","http://www.debian.org/security/2005/dsa-715","http://secunia.com/advisories/15126/","http://www.ciac.org/ciac/bulletins/p-195.shtml"],"cveids":["CVE-2004-1342"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-27T17:12:32Z","publicdate":"2005-04-27T00:00:00Z","datefirstpublished":"2005-05-05T19:07:49Z","dateupdated":"2005-05-11T14:27:08Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"10.546875","cam_scorecurrentwidelyknown":"12.65625","cam_scorecurrentwidelyknownexploited":"21.09375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.546875,"vulnote":null}