Heap-based buffer overflow - CVE-2010-3846
Published: November 5, 2010 / Updated: July 27, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Array index error in the apply_rcs_change function in rcs.c in CVS 1.11.23. A remote attacker can use an RCS file containing crafted delta fragment changes that trigger a heap-based buffer overflow. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2010-3846
Sources
- http://cvs.savannah.gnu.org/viewvc/cvs/ccvs/src/rcs.c?r1=1.262.4.65&r2=1.262.4.66&sortby=rev
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050212.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050287.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/050090.html
- http://secunia.com/advisories/41079
- http://secunia.com/advisories/42041
- http://secunia.com/advisories/42409
- http://www.osvdb.org/68952
- http://www.redhat.com/support/errata/RHSA-2010-0918.html
- http://www.securityfocus.com/bid/44528
- http://www.securitytracker.com/id?1024795
- http://www.vupen.com/english/advisories/2010/2845
- http://www.vupen.com/english/advisories/2010/2846
- http://www.vupen.com/english/advisories/2010/2869
- http://www.vupen.com/english/advisories/2010/2899
- http://www.vupen.com/english/advisories/2010/3080
- https://bugzilla.redhat.com/show_bug.cgi?id=642146
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62858