Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 402593 (CVE-2012-0804) - <dev-vcs/cvs-1.12.12-r11: heap-based overflow in client on bad proxy response (CVE-2012-0804)
Summary: <dev-vcs/cvs-1.12.12-r11: heap-based overflow in client on bad proxy response...
Status: RESOLVED FIXED
Alias: CVE-2012-0804
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa cve cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-02-07 19:57 UTC by Petr Pisar
Modified: 2017-01-19 19:11 UTC (History)
1 user (show)

See Also:
Package list:
=dev-vcs/cvs-1.12.12-r11
Runtime testing required: ---
kensington: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Petr Pisar 2012-02-07 19:57:50 UTC
I found a heap buffer overflow in cvs client when parsing malformed proxy response on CONNECT request which triggers glibc internal memory check and SIGABRT, or causes segfault, or, under some circumstances, can lead to execute arbitrary code.

Because HTTP proxy support has been added into cvs-1.12, older releases are not vulnerable. This vulnerability is known as CVE-2012-0804 and it's public since 2012-02-06. See <https://bugzilla.redhat.com/show_bug.cgi?id=784141> for more details. CVS developer is aware about this issue, he approved proposed patch, but not yet committed it into CVS development tree. I could provide reproducer if you wish.

I confirmed this vulnerability on x86 with =dev-vcs/cvs-1.12.12-r6.
Comment 1 Tim Sammut (RETIRED) gentoo-dev 2012-02-08 17:25:49 UTC
The proposed patch from the Red Hat bug:

https://bugzilla.redhat.com/attachment.cgi?id=559993&action=diff&context=patch&collapsed=&headers=1&format=raw
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2012-06-15 18:58:23 UTC
CVE-2012-0804 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0804):
  Heap-based buffer overflow in the proxy_connect function in src/client.c in
  CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of
  service (crash) and possibly execute arbitrary code via a crafted HTTP
  response.
Comment 3 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-08-05 19:48:54 UTC
We still don't seem to carry the patch for this issue, and I have been unavailable to discover a release containing it. I propose to patch the current CVS version to fix this issue as no new release seems likely at this point.
Comment 4 Aaron Bauman (RETIRED) gentoo-dev 2016-02-21 04:42:13 UTC
Redhat patch:

https://bugzilla.redhat.com/show_bug.cgi?id=784141

Affected versions still in tree with no patch.
Comment 5 Felix Janda 2016-10-22 01:16:56 UTC
I've opened a pull request

https://github.com/gentoo/gentoo/pull/2627

which in particular adds the redhat patch.
Comment 6 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-19 19:33:56 UTC
Thanks to Felix and everyone involved into the bump!


@ Arches,

please mark stable: =dev-vcs/cvs-1.12.12-r11

Stable target(s): alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 7 Agostino Sarubbo gentoo-dev 2016-11-20 13:05:08 UTC
amd64 stable
Comment 8 Agostino Sarubbo gentoo-dev 2016-11-20 13:08:39 UTC
x86 stable
Comment 9 Tobias Klausmann (RETIRED) gentoo-dev 2016-11-23 09:21:16 UTC
Stable on alpha.
Comment 10 Markus Meier gentoo-dev 2016-11-29 17:20:29 UTC
arm stable
Comment 11 Agostino Sarubbo gentoo-dev 2017-01-01 12:44:05 UTC
ppc stable
Comment 12 Agostino Sarubbo gentoo-dev 2017-01-03 10:38:57 UTC
ppc64 stable
Comment 13 Jeroen Roovers (RETIRED) gentoo-dev 2017-01-09 13:47:51 UTC
Stable for HPPA.
Comment 14 Agostino Sarubbo gentoo-dev 2017-01-11 10:36:06 UTC
sparc stable
Comment 15 Agostino Sarubbo gentoo-dev 2017-01-17 14:24:41 UTC
ia64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 16 Aaron Bauman (RETIRED) gentoo-dev 2017-01-18 08:43:13 UTC
New GLSA request filed.
Comment 17 GLSAMaker/CVETool Bot gentoo-dev 2017-01-19 19:11:02 UTC
This issue was resolved and addressed in
 GLSA 201701-44 at https://security.gentoo.org/glsa/201701-44
by GLSA coordinator Thomas Deutschmann (whissi).