Vulnerability Note VU#327037

Debian CVS "pserver" remote access authentication bypass vulnerability

Original Release date: 05 May 2005 | Last revised: 11 May 2005


Debian Concurrent Versions System (CVS) remote repositories using "pserver" with the cvs-repouid Debian patch are vulnerable to authentication bypass.


CVS is a version control and source code maintenance system that is widely used by open-source software development projects.

The "pserver" is one method used to provide remote access to CVS repositories. Debian included a patch/enhancement, referred to as the cvs-repouid patch, to enhance security when using the "pserver" remote access method.

Using the pserver access method in conjunction with the Debian repouid patch, it is possible to bypass the password authentication mechanism and gain access to the repository in question. Debian states in their original security advisory that this vulnerability is Debian specific.


Attackers could obtain unauthorized remote access to a CVS repository and modify its contents.


Apply the patch

Debian reported that the vulnerability has been fixed in the:
stable distribution (woody) version 1.11.1p1debian-10.
unstable distribution (sid) version 1.12.9-11.

For more information see Debian's security advisory available at:

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
DebianAffected-29 Apr 2005
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Debian credits Maks Polunin and Alberto Garcia with independently discovering this issue. This vulnerability was reported in Debian advisory DSA-715-1.

This document was written by Robert Mead based on information from Debian.

Other Information

  • CVE IDs: CAN-2004-1342
  • Date Public: 27 Apr 2005
  • Date First Published: 05 May 2005
  • Date Last Updated: 11 May 2005
  • Severity Metric: 10.55
  • Document Revision: 19


If you have feedback, comments, or additional information about this vulnerability, please send us email.