Vulnerabilites related to apache - subversion
Vulnerability from fkie_nvd
Published
2014-07-28 19:55
Modified
2025-04-12 10:46
Severity ?
Summary
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3)." }, { "lang": "es", "value": "El m\u00f3dulo daemonize.py en Subversion 1.8.0 anterior a 1.8.2 permite a usuarios locales ganar privilegios a trav\u00e9s de un ataque de enlace simb\u00f3lico sobre el fichero pid creado para (1) svnwcsub.py o (2) irkerbridge.py cuando la opci\u00f3n --pidfile est\u00e1 utilizada. NOTA: este problema fue dividido (SPLIT) de CVE-2013-4262 basado en diferentes versiones afectadas (ADT3)." } ], "id": "CVE-2013-7393", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-28T19:55:03.320", "references": [ { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-08 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7344422F-F65A-4000-A9EF-8D323DA29011", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*", "matchCriteriaId": "8CDFD93B-693D-46DC-9C39-FDECB3E619E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*", "matchCriteriaId": "AA856400-1B48-429A-94A0-173B7EEE1EC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers." }, { "lang": "es", "value": "Los servidores (1) mod_dav_svn yd (2) svnserve en Subversion 1.6.0 hasta 1.7.19 y 1.8.0 hasta 1.8.11 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y abortar) a trav\u00e9s de combinaciones de par\u00e1metros relacionadas con n\u00fameros de revisi\u00f3n evaluados din\u00e1micamente." } ], "id": "CVE-2015-0248", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-08T18:59:01.827", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74260" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1033214" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT205217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74260" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT205217" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-18 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6.z:*:*:*:*:*:*:*", "matchCriteriaId": "3FB4F7C3-1521-42B6-9820-15C2B156BAD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "81EE9433-C21F-4902-B37E-CF4FC1132B72", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn Apache HTTPD del servidor Apache Subversion 1.x anterior a 1.7.19 y 1.8.x anterior a 1.8.11 permite a atacantes remotos llevar a cabo una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda de servidor) mediante una petici\u00f3n REPORT para un recurso inexistente." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2014-3580", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-18T15:59:00.070", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61131" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3107" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/71726" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-12-09 10:15
Modified
2025-07-15 16:35
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.
All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.
Repositories served via other access methods are not affected.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://subversion.apache.org/security/CVE-2024-46901-advisory.txt | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2025/04/msg00023.html | Mailing List, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0044D4E-5597-4E3C-B300-B0D36A707F58", "versionEndExcluding": "1.14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected." }, { "lang": "es", "value": "La validaci\u00f3n insuficiente de los nombres de archivo con respecto a los caracteres de control en Apache Subversion repositories que se sirven a trav\u00e9s de mod_dav_svn permite que los usuarios autenticados con acceso de confirmaci\u00f3n confirmen una revisi\u00f3n da\u00f1ada, lo que genera interrupciones para los usuarios del repositorio. Todas las versiones de Subversion hasta Subversion 1.14.4 incluida se ven afectadas si se sirven repositorios a trav\u00e9s de mod_dav_svn. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.14.5, que soluciona este problema. Los repositorios que se sirven a trav\u00e9s de otros m\u00e9todos de acceso no se ven afectados." } ], "id": "CVE-2024-46901", "lastModified": "2025-07-15T16:35:39.093", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-12-09T10:15:05.230", "references": [ { "source": "security@apache.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2024-46901-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00023.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-116" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2016-05-05 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.9.0 | |
apache | subversion | 1.9.1 | |
apache | subversion | 1.9.2 | |
apache | subversion | 1.9.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9BA15E-397D-4B1F-B755-8FFBBF58AE59", "versionEndIncluding": "1.8.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "892FF423-1848-4E69-8C4C-E1972B656196", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "74200C33-9505-48EB-964D-6CA28C7F6DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "09FBAFE7-986D-4B24-8122-FDCC380331C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string." }, { "lang": "es", "value": "La funci\u00f3n canonicalize_username en svnserve/cyrus_auth.c en Apache Subversion en versiones anteriores a 1.8.16 y 1.9.x en versiones anteriores a 1.9.4, cuando se utiliza autenticaci\u00f3n Cyrus SASL, permite a atacantes remotos autenticarse y eludir restricciones destinadas al acceso a trav\u00e9s de una cadena realm que se prefija a un repositorio de cadena realm esperado." } ], "id": "CVE-2016-2167", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-05T18:59:00.117", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/89417" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1035706" }, { "source": "secalert@redhat.com", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/89417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 | |
canonical | ubuntu_linux | 11.04 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
fedoraproject | fedora | 14 | |
fedoraproject | fedora | 15 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9076A4B-C9C0-4DD4-8EDE-2589C5C8E7F7", "versionEndIncluding": "1.5.8", "versionStartIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC997332-2E0B-4584-89E9-26BDADD2E817", "versionEndExcluding": "1.6.17", "versionStartIncluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "22675032-282C-4F77-B590-46F3FAD615C3", "versionEndExcluding": "10.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subersion v1.5.x y v1.6.x antes de 1.6.17, cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 habilitada permite a atacantes remotos a causar una denegaci\u00f3n de servicio (bucle infinito y consumo de memoria) mediante la petici\u00f3n de datos en circunstancias oportunistas." } ], "id": "CVE-2011-1783", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:01.940", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-18 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "81EE9433-C21F-4902-B37E-CF4FC1132B72", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav del servidor Apache HTTPD en Apache Subversion 1.7.x anterior a 1.7.19 y 1.8.x anterior a 1.8.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda) a trav\u00e9s de una petici\u00f3n a una URI que dispara una b\u00fasqueda para un nombre de transacci\u00f3n virtual que no existe." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2014-8108", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-18T15:59:01.350", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61131" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/71725" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
opensuse | opensuse | 12.1 | |
opensuse | opensuse | 12.2 | |
opensuse | opensuse | 12.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED06CC78-7AB5-4096-8F2A-04768D750D9B", "versionEndIncluding": "1.6.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL." }, { "lang": "es", "value": "El modulo mod_dav_svn Apache HTTPD server en Subversion v1.6.x hasta v1.6.21 y v1.7.0 hasta v1.7.8 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (referencia NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un bloqueo en una URL vigente." } ], "evaluatorImpact": "Per http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html\r\n\"Affected Products:\r\nopenSUSE 12.3\r\nopenSUSE 12.2\r\nopenSUSE 12.1\"", "id": "CVE-2013-1846", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.333", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "secalert@redhat.com", "url": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929087" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18087" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-07-28 19:55
Modified
2025-04-12 10:46
Severity ?
Summary
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.1 | |
apache | subversion | 1.8.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393." }, { "lang": "es", "value": "svnwcsub.py en Subversion 1.8.0 anterior a 1.8.3, cuando se utiliza la opci\u00f3n --pidfile y se funciona en el modo en primer plano, permite a usuarios locales ganar privilegios a trav\u00e9s de un ataque de enlace simb\u00f3lico sobre el fichero pid. NOTA: este problema fue dividido (SPLIT) debido a diferentes versiones afectadas (ADT3). El problema irkerbridge.py est\u00e1 cubierto por CVE-2013-7393." } ], "id": "CVE-2013-4262", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-07-28T19:55:03.273", "references": [ { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-14 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://subversion.apache.org/security/CVE-2015-5343-advisory.txt | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2015/dsa-3424 | Third Party Advisory | |
secalert@redhat.com | http://www.securitytracker.com/id/1034470 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2015-5343-advisory.txt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2015/dsa-3424 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034470 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A39D519B-FEAC-46DA-8661-516173A0EE96", "versionEndIncluding": "1.7.20", "versionStartIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B3D8BC-10EE-414A-A456-7A2142EADF7B", "versionEndExcluding": "1.8.15", "versionStartIncluding": "1.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "E259218B-E34A-4D3D-9D31-52A22853EFA0", "versionEndExcluding": "1.9.3", "versionStartIncluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow." }, { "lang": "es", "value": "Desbordamiento de entero en util.c en mod_dav_svn en Apache Subversion 1.7.x, 1.8.x en versiones anteriores a 1.8.15 y 1.9.x en versiones anteriores a 1.9.3 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (ca\u00edda de servidor subversion o consumo de memoria) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un cuerpo de petici\u00f3n con codificado skel, lo que desencadena una lectura fuera de rango y desbordamiento de buffer basado en memoria din\u00e1mica." } ], "id": "CVE-2015-5343", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-14T14:59:01.253", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3424" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034470" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.405261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.405261" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-17 10:15
Modified
2024-11-21 05:08
Severity ?
Summary
Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html | Mailing List, Third Party Advisory | |
security@apache.org | https://subversion.apache.org/security/CVE-2020-17525-advisory.txt | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://subversion.apache.org/security/CVE-2020-17525-advisory.txt | Exploit, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "693F5DB8-76CC-4A99-B83D-DAA6CF9A207E", "versionEndExcluding": "1.10.7", "versionStartIncluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE489C7C-7BF8-40DC-83F1-95BF531ACDE7", "versionEndExcluding": "1.14.1", "versionStartIncluding": "1.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" }, { "lang": "es", "value": "El m\u00f3dulo mod_authz_svn de Subversion se bloquear\u00e1 si el servidor est\u00e1 usando reglas de autenticaci\u00f3n en el repositorio con la opci\u00f3n AuthzSVNReposRelativeAccessFile y un cliente env\u00eda una petici\u00f3n para una URL de repositorio no existente.\u0026#xa0;Esto puede causar interrupciones para los usuarios del servicio.\u0026#xa0;Este problema se solucion\u00f3 en los servidores mod_dav_svn+mod_authz_svn versi\u00f3n 1.14.1 y los servidores mod_dav_svn+mod_authz_svn versi\u00f3n 1.10.7" } ], "id": "CVE-2020-17525", "lastModified": "2024-11-21T05:08:17.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-17T10:15:11.873", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html" }, { "source": "security@apache.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-06-01 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
webdav | neon | * | |
apache | openoffice | * | |
apache | subversion | * | |
webdav | cadaver | * | |
debian | debian_linux | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webdav:neon:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA2849E5-AB29-42FB-9FCA-58232AD2212F", "versionEndExcluding": "0.24.5", "versionStartIncluding": "0.19.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCCAF014-CA2E-4079-971A-FEC7E2D7D7A2", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B974D6F-2565-43DA-86F3-59D976DF7F07", "vulnerable": false }, { "criteria": "cpe:2.3:a:webdav:cadaver:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD1C27C4-0DFD-4FC5-AC73-26637F80CC7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code." }, { "lang": "es", "value": "Multiples vulenerabilidades de cadena de formato en (1) neon 0.24.4 y anteriores, y otros productos que usan neon incluyendo (2) Cadaver, (3) Subversion, o (4) OpenOffice, permite a servidores remotos WebDAV maliciosos ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2004-0179", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-06-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213873203477\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108214147022626\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/11363" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-01.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-04.xml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-487" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/5365" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-157.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-158.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-159.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-160.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/10136" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213873203477\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=108214147022626\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/11363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200405-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/5365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-158.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-159.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-160.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/10136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-26 16:15
Modified
2024-11-21 03:44
Severity ?
Summary
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://subversion.apache.org/security/CVE-2018-11782-advisory.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2018-11782-advisory.txt | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | 1.12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50DD0181-B9AA-42E5-813E-8912532052BB", "versionEndIncluding": "1.9.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "198D8E5E-4D92-43C4-8C30-C940255B4FB0", "versionEndIncluding": "1.10.4", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45E5978-D958-44EB-8434-63078915B03C", "versionEndIncluding": "1.11.1", "versionStartIncluding": "1.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60BCD44-BA16-4A6F-9B4D-2BA89601C76F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server." }, { "lang": "es", "value": "En Apache Subversion versiones hasta 1.9.10, 1.10.4, 1.12.0 incluy\u00e9ndolas, el proceso del servidor svnserve de Subversion puede cerrarse cuando una petici\u00f3n de solo lectura bien formada produce una respuesta en particular. Esto puede conllevar a interrupciones para usuarios del servidor." } ], "id": "CVE-2018-11782", "lastModified": "2024-11-21T03:44:01.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-26T16:15:10.363", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-10-04 21:00
Modified
2025-04-11 00:51
Severity ?
Summary
authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.5.0 | |
apache | subversion | 1.5.1 | |
apache | subversion | 1.5.2 | |
apache | subversion | 1.5.3 | |
apache | subversion | 1.5.4 | |
apache | subversion | 1.5.5 | |
apache | subversion | 1.5.6 | |
apache | subversion | 1.5.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands." }, { "lang": "es", "value": "authz.c del m\u00f3dulo mod_dav_svn del servidor HTTP Apache, como se ha distribu\u00eddo en Apache Subversion v1.5.x anteriores a la v1.5.8 y v1.6.x anteriores a la v1.6.13, cuando SVNPathAuthz short_circuit est\u00e1 activo, no maneja apropiadamente un repositorio con nombre como una regla de alcance, lo que permite a usuarios autenticados remotos evitar las restricciones previstas a trav\u00e9s de comandos svn." } ], "id": "CVE-2010-3315", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-10-04T21:00:04.063", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41652" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43139" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43346" }, { "source": "secalert@redhat.com", "url": "http://security-tracker.debian.org/tracker/CVE-2010-3315" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://subversion.apache.org/security/CVE-2010-3315-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT4581" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2010/dsa-2118" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:199" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/41652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security-tracker.debian.org/tracker/CVE-2010-3315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://subversion.apache.org/security/CVE-2010-3315-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-2118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-16" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 10.10 | |
canonical | ubuntu_linux | 11.04 | |
debian | debian_linux | 5.0 | |
debian | debian_linux | 6.0 | |
fedoraproject | fedora | 14 | |
fedoraproject | fedora | 15 | |
apple | mac_os_x | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEB10649-014A-4A39-964B-19776A6C07B4", "versionEndExcluding": "1.6.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "matchCriteriaId": "BDE52846-24EC-4068-B788-EC7F915FFF11", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "matchCriteriaId": "9396E005-22D8-4342-9323-C7DEA379191D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "22675032-282C-4F77-B590-46F3FAD615C3", "versionEndExcluding": "10.7.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011." }, { "lang": "es", "value": "M\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subversion antes de v1.6.17, permite a atacantes remotos provocar una denegaci\u00f3n de servicio ( desreferenciar punteros Nulos y ca\u00edda del demonio ) a trav\u00e9s de una solicitud de una l\u00ednea base de recursos WebDAV, como se explot\u00f3 en mayo de 2011." } ], "id": "CVE-2011-1752", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:01.550", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44879" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0861.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025617" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/45162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0861.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/48091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1025617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2025-04-11 00:51
Severity ?
Summary
contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
collabnet | subversion | 1.6.17 | |
opensuse | opensuse | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB53A2F2-923F-4959-95D5-CBD665F68E64", "versionEndIncluding": "1.6.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:collabnet:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "473AAEA5-A18F-4BF7-8F70-57E0582AEC16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename." }, { "lang": "es", "value": "contrib/hook-scripts/svn-keyword-check.pl en Subversion anterior a 1.6.23, permite a usuarios autenticados remotamente con permisos de \"commit\" la ejecuci\u00f3n de comandos arbitrarios a trav\u00e9s de metacaracteres shell en un nombre de archivo." } ], "id": "CVE-2013-2088", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:24.710", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18772" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt" }, { "source": "secalert@redhat.com", "url": "https://www.exploit-db.com/exploits/40507/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18772" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/40507/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 18:15
Modified
2024-11-21 06:49
Severity ?
Summary
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
apple | macos | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4BB582E-958E-4729-9EB9-EEAED5314FD2", "versionEndExcluding": "1.10.8", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DBAEE04-1D22-41CB-8C32-5DDD29A42DC4", "versionEndExcluding": "1.14.2", "versionStartIncluding": "1.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFABC0C7-944C-4B46-A985-8B4F8BF93F54", "versionEndExcluding": "12.5", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected." }, { "lang": "es", "value": "La funci\u00f3n mod_dav_svn de Subversion es vulnerable a una corrupci\u00f3n de memoria. Mientras buscan reglas de autorizaci\u00f3n basadas en rutas, los servidores mod_dav_svn pueden intentar usar memoria que ya ha sido liberada. Afecta a los servidores mod_dav_svn de Subversion 1.10.0 a 1.14.1 (inclusive). Los servidores que no usan mod_dav_svn no est\u00e1n afectados" } ], "id": "CVE-2022-24070", "lastModified": "2024-11-21T06:49:45.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T18:15:09.137", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/SVN-4880" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://issues.apache.org/jira/browse/SVN-4880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5119" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 | |
apache | subversion | 1.7.9 | |
apache | subversion | 1.7.10 | |
apache | subversion | 1.8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root." }, { "lang": "es", "value": "El mod_dav_svn del m\u00f3dulo Apache HTTPD server en Subversion 1.7.0 a la 1.7.10 y 1.8.x anterior a 1.8.1, permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n o lectura fuera de rango) a trav\u00e9s de determinadas peticiones (1) COPY, (2) DELETE, o (3) MOVE contra la revisi\u00f3n de \"root\"." } ], "id": "CVE-2013-4131", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:28.880", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/61454" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=986194" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85983" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/61454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=986194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18621" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-06 19:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.5.0 | |
apache | subversion | 1.5.1 | |
apache | subversion | 1.5.2 | |
apache | subversion | 1.5.3 | |
apache | subversion | 1.5.4 | |
apache | subversion | 1.5.5 | |
apache | subversion | 1.5.6 | |
apache | subversion | 1.5.7 | |
apache | subversion | 1.5.8 | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para Apache HTTP Server, como se distribuye en Apache Subversion v1.5.x y v1.6.x anteriores a 1.6.17,cuando la opci\u00f3n SVNPathAuthz short_circuit est\u00e1 deshabilitada no se aplican correctamente los permisos para los archivos que hab\u00edan sido legibles p\u00fablicamente en el pasado, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una operaci\u00f3n de reproducci\u00f3n de INFORMES.\r\n" } ], "id": "CVE-2011-1921", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-06T19:55:02.020", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/44849" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/44888" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/45162" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT5130" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48091" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1025619" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67804" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT5130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48091" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18999" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist." }, { "lang": "es", "value": "El modulo mod_dav_svn Apache HTTPD server en Subversion v1.6.0 hasta v1.6.20 y v1.7.0 hasta v1.7.8 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un bloqueo an\u00f3nimo para una URL que no existe." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2013-1847", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.357", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929090" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18538" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-01-08 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.9.0 | |
apache | subversion | 1.9.1 | |
apache | subversion | 1.9.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "892FF423-1848-4E69-8C4C-E1972B656196", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "74200C33-9505-48EB-964D-6CA28C7F6DB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read." }, { "lang": "es", "value": "Desbordamiento de entero en la funci\u00f3n read_string en libsvn_ra_svn/marshal.c en Apache Subversion 1.9.x en versiones anteriores a 1.9.3 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena del protocolo svn://, lo que desencadena un desbordamiento de buffer basado en memoria din\u00e1mica y una lectura fuera de rango." } ], "id": "CVE-2015-5259", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-01-08T19:59:01.410", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/82300" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1034469" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/82300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" }, { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2025-04-11 00:51
Severity ?
Summary
Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
collabnet | subversion | 1.6.17 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 | |
apache | subversion | 1.7.9 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
opensuse | opensuse | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB53A2F2-923F-4959-95D5-CBD665F68E64", "versionEndIncluding": "1.6.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:collabnet:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "473AAEA5-A18F-4BF7-8F70-57E0582AEC16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name." }, { "lang": "es", "value": "Subversion anterior a 1.6.23 y 1.7.x anterior a 1.7.10, permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (corrupci\u00f3n del repositorio FSF) a trav\u00e9s de un car\u00e1cter de nueva l\u00ednea en un nombre de archivo." } ], "id": "CVE-2013-1968", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:24.467", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18986" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-16 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C25F7-0A02-4974-8144-839955C373C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "79A64E1B-2E80-4A95-AA46-3CF66268EB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "2A83933C-D270-4B9A-8D18-AC7302A5B86F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.14:*:*:*:*:*:*:*", "matchCriteriaId": "E8645A28-11C4-4217-88FA-14122E740AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.15:*:*:*:*:*:*:*", "matchCriteriaId": "5C07A431-98B5-4D52-B7DA-0A6FBF956D6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.16:*:*:*:*:*:*:*", "matchCriteriaId": "BBF63977-9D8E-4550-8A2E-187F435C059B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "892FF423-1848-4E69-8C4C-E1972B656196", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "74200C33-9505-48EB-964D-6CA28C7F6DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "09FBAFE7-986D-4B24-8122-FDCC380331C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "32B6148E-3E5F-4DCB-BD8E-45B3D56CB18C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." }, { "lang": "es", "value": "El m\u00f3dulo mod_dontdothat y los clientes HTTP en su versi\u00f3n 1.4.0 hasta la 1.8.16 y 1.9.0 hasta la 1.9.4 de Apache Subversion son vulnerables a un ataque de denegaci\u00f3n de servicio (DoS) provocado por la expansi\u00f3n exponencial de la entidad XML. El ataque puede provocar que el proceso objetivo consuma una cantidad excesiva de recursos de la CPU o memoria." } ], "id": "CVE-2016-8734", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-16T13:29:00.220", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94588" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037361" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/94588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-07-31 13:20
Modified
2025-04-11 00:51
Severity ?
Summary
The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
collabnet | subversion | 1.6.17 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 | |
apache | subversion | 1.7.9 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 12.10 | |
canonical | ubuntu_linux | 13.04 | |
opensuse | opensuse | 11.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB53A2F2-923F-4959-95D5-CBD665F68E64", "versionEndIncluding": "1.6.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:collabnet:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "473AAEA5-A18F-4BF7-8F70-57E0582AEC16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection." }, { "lang": "es", "value": "El servidor svnserve en Subversion anterior a 1.6.23 y 1.7.x anterior a 1.7.10, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (salida) terminando una conexi\u00f3n." } ], "id": "CVE-2013-2112", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-07-31T13:20:24.727", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19057" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-16 19:14
Modified
2025-04-11 00:51
Severity ?
Summary
Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option." }, { "lang": "es", "value": "Svnserve en Apache Subversion 1.4.0 a 1.7.12 y 1.8.0 a 1.8.1 permite a usuarios locales sobrescribir archivos arbirtrarios o matar procesos arbitrarios a trav\u00e9s de un ataque de enlaces simb\u00f3licos sobre el fichero especificado por la opci\u00f3n --pid-file." } ], "id": "CVE-2013-4277", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-09-16T19:14:39.193", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00031.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00054.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/62266" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86972" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/62266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18554" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-07 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "90CA8726-9C56-41CA-B0AD-D6A0877EDEE6", "versionEndIncluding": "1.6.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3BB33539-0E47-4FBC-B509-A80CB0525B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "41CAF981-A3D6-4732-A291-FB50D91EE172", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "62A88525-321D-4329-8B2C-2B912B0E13A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7A498782-9837-4CFD-BFF2-684AAF8CF5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BF7F7DF-DAB2-4456-9AFF-EA5DC6293115", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B58F83FD-604A-43E2-8310-B0133EB8CE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F6E57BE-7D32-4838-9F1F-142F67ABB1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD6FB430-467A-499A-A231-3ABDC49CF989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC95E7E-69C2-40A4-A337-C8DCC2296773", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "001D8708-8543-4CD8-9DD7-49304144BA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "05F90085-6351-4792-8A5F-9B8F0AD66828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "05583331-0A4A-405B-9B01-79E59CA6C6A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DA872BC-38F1-482D-A23D-31BD195A9859", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE048E8E-13FA-4487-8631-28449393F631", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "C287F1A7-6641-4005-8099-985BA1231619", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EC9B24B-100A-48B5-862A-6F6049F7E751", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0E02F3C-DF1F-49DE-8EF7-0AF1043C9EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "63EC30E3-BB43-4DCB-A808-28E3A70559AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "853D4C9E-21FC-4411-B85D-F0625B370286", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8BE82629-5207-4E90-B80C-71D85A80DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78B8E-CA40-4ADE-99BA-E83E7F4C28F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "E970D014-E037-46E0-BC4C-275EF1345036", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4E3CD50-3ED8-4B2B-8526-E7F8FB23BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B216AE-069C-4A98-8F8C-ABFC3FFE2B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EBB65E0-E3D0-40E2-84EC-5210A482672A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "06B57B0B-BC24-442E-B9B5-7CA620687833", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "59089857-7F61-4112-8757-666C8ED5674E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D19CA9A-081B-499E-B3DE-F5C5D05DB156", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "577C74A5-E87E-4ABE-8673-ECBFAB782A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A3CF8AC-F42C-4365-944F-3BB99D090F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE674329-C25B-442C-9057-035AF25F1B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C011BE5-E603-4EED-B1A5-B5DA935CEB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D6BE30C-E4D4-4A7F-8BA0-F25DE9F6348F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "74421EC5-BD41-4F09-BBD3-7C5575B8A9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0E83DCB-0C73-4943-940D-355063A1F194", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "F33F16C3-326D-4F6E-87EB-25872A735567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "B08E7421-BB83-41A7-9285-983165C2AC5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "59E55A2F-0CF6-4C9F-BC01-0041156F0D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E0A1C51-0684-4384-88C1-C7BDEB0413DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7379952-D4B6-4256-888D-F2CC2B05CB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "6555DBBD-0366-40FA-A772-6722B4D2888A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "803058ED-4566-4609-B250-7BA6AB6EE054", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "933F4E36-4B89-4C3C-9FAA-7A757CBBA3FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A31BD1-325F-4BEA-9D2F-17611032B44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "69324D9E-7223-4AE2-A950-EA32925544F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "00351004-8FE7-4C35-97B9-CA29BE5325E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "2872908F-4656-4F6F-9950-64978CE0B533", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6736466E-B29D-4E50-86BB-D3DD70AFA4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "70E23F84-C03A-4E95-AD7D-F42F3478F786", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0B7EF4A-5989-4EE9-8747-7605D4C0C8CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "638C8FFA-A26C-47B6-B9B2-A34B92639F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7CBDEE8-5933-4468-AD9E-B63340353677", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "C70A147D-EB27-4EF4-A1E4-6B1D24D33B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BB268C-C29B-4200-96AE-5133B2DC1095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "matchCriteriaId": "ADEF93A5-5D53-4EA7-8865-CA0EABC18A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "matchCriteriaId": "023127A5-04AD-4725-85EB-3D08C08DFB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "matchCriteriaId": "689E87D0-BAA7-420D-A700-C07376F312F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "matchCriteriaId": "D3073CF2-E398-408C-9782-702F83663557", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections." }, { "lang": "es", "value": "La funci\u00f3n walk en repos.c en el m\u00f3dulo mod_dav_svn para el servidor Apache HTTP, como los distribuidos en Apache Subversion anteriores a v1.6.15, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (desreferencia a puntero NULL y ca\u00edda del demonio) a trav\u00e9s de vectores que provocan el seguimiento de Las colecciones SVNParentPath." } ], "id": "CVE-2010-4539", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-07T19:00:19.313", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/01/03/9" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42780" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42969" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43115" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43139" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43346" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1033166" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45655" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024934" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0162" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/01/03/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1033166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2025-04-12 10:46
Severity ?
Summary
Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "81EE9433-C21F-4902-B37E-CF4FC1132B72", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6.z:*:*:*:*:*:*:*", "matchCriteriaId": "3FB4F7C3-1521-42B6-9820-15C2B156BAD6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm." }, { "lang": "es", "value": "Apache Subversion 1.0.0 hasta 1.7.x anterior a 1.7.17 y 1.8.x anterior a 1.8.10 utiliza un hash MD5 de la URL y el reino (realm) de la autenticaci\u00f3n para almacenar las credenciales de cach\u00e9, lo que facilita a servidores remotos obtener credenciales a trav\u00e9s de un reino (realm) de la autenticaci\u00f3n manipulado." } ], "id": "CVE-2014-3528", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-19T18:55:02.687", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59432" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59584" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60722" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/68995" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/68995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-255" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-30 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101620 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://subversion.apache.org/security/CVE-2013-4246-advisory.txt | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101620 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://subversion.apache.org/security/CVE-2013-4246-advisory.txt | Issue Tracking, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3E73D419-98FC-4B10-BEE6-754519D23FC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "77656A87-4447-488E-8F0B-B505DB71034B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "5C01C26D-EFDF-49A7-B3C1-19F6DBC6FF25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties." }, { "lang": "es", "value": "libsvn_fs_fs/fs_fs.c en Apache Subversion en versiones 1.8.x anteriores a la 1.8.2 podr\u00eda permitir que usuarios autenticados remotos con acceso commit corrompan repositorios FSFS y provoquen una denegaci\u00f3n de servicio u obtengan informaci\u00f3n sensible editando las propiedades de revisi\u00f3n de paquetes." } ], "id": "CVE-2013-4246", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-30T14:29:00.423", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101620" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-12 18:15
Modified
2024-11-21 05:59
Severity ?
Summary
Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 | |
apple | macos | * | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0F5ACC5-2DD1-4E01-AF14-13B20CE4394B", "versionEndIncluding": "1.14.1", "versionStartIncluding": "1.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFABC0C7-944C-4B46-A985-8B4F8BF93F54", "versionEndExcluding": "12.5", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal \u0027copyfrom\u0027 paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the \u0027copyfrom\u0027 path of the original. This also reveals the fact that the node was copied. Only the \u0027copyfrom\u0027 path is revealed; not its contents. Both httpd and svnserve servers are vulnerable." }, { "lang": "es", "value": "Apache Subversion SVN authz protected copyfrom paths regresi\u00f3n Los servidores de Subversion revelan rutas \"copyfrom\" que deber\u00edan estar ocultas de acuerdo con las reglas configuradas de autorizaci\u00f3n basada en rutas (authz). Cuando un nodo ha sido copiado desde una ubicaci\u00f3n protegida, los usuarios con acceso a la copia pueden visualizar la ruta \"copyfrom\" del original. Esto tambi\u00e9n revela el hecho de que el nodo fue copiado. S\u00f3lo es revelada la ruta \"copyfrom\"; no su contenido. Los servidores httpd y svnserve son vulnerables" } ], "id": "CVE-2021-28544", "lastModified": "2024-11-21T05:59:49.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-12T18:15:08.250", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "source": "security@apache.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT213345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5119" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security@apache.org", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable." }, { "lang": "es", "value": "El modulo mod_dav_svn Apache HTTPD server en Subversion v1.7.0 hasta v1.7.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (falta de segmentaci\u00f3n y ca\u00edda) a trav\u00e9s de una petici\u00f3n de registro de log REPORT con un limite invalido, , lo que dispara un acceso a una variable sin inicializar." } ], "evaluatorImpact": "Per http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html\r\n\"Affected Products:\r\nopenSUSE 12.3\r\nopenSUSE 12.2\r\nopenSUSE 12.1\"", "id": "CVE-2013-1884", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.400", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929095" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929095" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18788" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-07 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:mod_dontdothat:-:*:*:*:*:*:*:*", "matchCriteriaId": "A25A7E22-19B7-4A4A-97D3-655434BC242F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request." }, { "lang": "es", "value": "La funci\u00f3n is_this_legal en mod_dontdothat para Apache Subversion 1.4.0 a 1.7.13 y 1.8.0 a 1.8.4 permite a atacantes remotos sortear restricciones de acceso intencionadas y posiblemente causar denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de URL relativas en una petici\u00f3n REPORT." } ], "id": "CVE-2013-4505", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-07T20:55:02.540", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/100364" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55855" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/100364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-08 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.1 | |
apache | subversion | 1.8.2 | |
apache | subversion | 1.8.3 | |
apache | subversion | 1.8.4 | |
apache | subversion | 1.8.5 | |
apache | subversion | 1.8.6 | |
apache | subversion | 1.8.7 | |
apache | subversion | 1.8.8 | |
apache | subversion | 1.8.9 | |
apache | subversion | 1.8.10 | |
apache | subversion | 1.8.11 | |
opensuse | opensuse | 13.1 | |
opensuse | opensuse | 13.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes." }, { "lang": "es", "value": "El servidor mod_dav_svn en Subversion 1.8.0 hasta 1.8.11 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un n\u00famero grande de solicitudes REPORT, lo que provoca el salto de nodos del repositorio FSFS." } ], "id": "CVE-2015-0202", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-08T18:59:00.077", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/76446" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1032100" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1032100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-03-11 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FA7FA65-3F04-4215-B1CF-F29CEC9ACB6F", "versionEndIncluding": "1.6.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3BB33539-0E47-4FBC-B509-A80CB0525B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "41CAF981-A3D6-4732-A291-FB50D91EE172", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "62A88525-321D-4329-8B2C-2B912B0E13A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7A498782-9837-4CFD-BFF2-684AAF8CF5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BF7F7DF-DAB2-4456-9AFF-EA5DC6293115", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B58F83FD-604A-43E2-8310-B0133EB8CE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F6E57BE-7D32-4838-9F1F-142F67ABB1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD6FB430-467A-499A-A231-3ABDC49CF989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC95E7E-69C2-40A4-A337-C8DCC2296773", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "001D8708-8543-4CD8-9DD7-49304144BA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "05F90085-6351-4792-8A5F-9B8F0AD66828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "05583331-0A4A-405B-9B01-79E59CA6C6A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DA872BC-38F1-482D-A23D-31BD195A9859", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE048E8E-13FA-4487-8631-28449393F631", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "C287F1A7-6641-4005-8099-985BA1231619", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EC9B24B-100A-48B5-862A-6F6049F7E751", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0E02F3C-DF1F-49DE-8EF7-0AF1043C9EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "63EC30E3-BB43-4DCB-A808-28E3A70559AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "853D4C9E-21FC-4411-B85D-F0625B370286", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8BE82629-5207-4E90-B80C-71D85A80DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78B8E-CA40-4ADE-99BA-E83E7F4C28F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "E970D014-E037-46E0-BC4C-275EF1345036", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4E3CD50-3ED8-4B2B-8526-E7F8FB23BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B216AE-069C-4A98-8F8C-ABFC3FFE2B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EBB65E0-E3D0-40E2-84EC-5210A482672A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "06B57B0B-BC24-442E-B9B5-7CA620687833", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "59089857-7F61-4112-8757-666C8ED5674E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D19CA9A-081B-499E-B3DE-F5C5D05DB156", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "577C74A5-E87E-4ABE-8673-ECBFAB782A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A3CF8AC-F42C-4365-944F-3BB99D090F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE674329-C25B-442C-9057-035AF25F1B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C011BE5-E603-4EED-B1A5-B5DA935CEB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D6BE30C-E4D4-4A7F-8BA0-F25DE9F6348F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "74421EC5-BD41-4F09-BBD3-7C5575B8A9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0E83DCB-0C73-4943-940D-355063A1F194", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "F33F16C3-326D-4F6E-87EB-25872A735567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "B08E7421-BB83-41A7-9285-983165C2AC5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "59E55A2F-0CF6-4C9F-BC01-0041156F0D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E0A1C51-0684-4384-88C1-C7BDEB0413DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7379952-D4B6-4256-888D-F2CC2B05CB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "6555DBBD-0366-40FA-A772-6722B4D2888A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "803058ED-4566-4609-B250-7BA6AB6EE054", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "933F4E36-4B89-4C3C-9FAA-7A757CBBA3FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A31BD1-325F-4BEA-9D2F-17611032B44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "69324D9E-7223-4AE2-A950-EA32925544F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "00351004-8FE7-4C35-97B9-CA29BE5325E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "2872908F-4656-4F6F-9950-64978CE0B533", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6736466E-B29D-4E50-86BB-D3DD70AFA4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "70E23F84-C03A-4E95-AD7D-F42F3478F786", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0B7EF4A-5989-4EE9-8747-7605D4C0C8CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "638C8FFA-A26C-47B6-B9B2-A34B92639F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7CBDEE8-5933-4468-AD9E-B63340353677", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "C70A147D-EB27-4EF4-A1E4-6B1D24D33B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BB268C-C29B-4200-96AE-5133B2DC1095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "matchCriteriaId": "ADEF93A5-5D53-4EA7-8865-CA0EABC18A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "matchCriteriaId": "023127A5-04AD-4725-85EB-3D08C08DFB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "matchCriteriaId": "689E87D0-BAA7-420D-A700-C07376F312F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "matchCriteriaId": "D3073CF2-E398-408C-9782-702F83663557", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." }, { "lang": "es", "value": "El m\u00f3dulo mod_dav_svn para el servidor Apache HTTP, como el distribuido en Apache Subversion antes de v1.6.16, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (desreferenciar de puntero NULL y ca\u00edda de demonio) a trav\u00e9s de una solicitud que contiene un token de bloqueo." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html \r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2011-0715", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-03-11T22:55:05.650", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43583" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43603" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43672" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43794" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1025161" }, { "source": "secalert@redhat.com", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT4723" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/70964" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46734" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1025161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/70964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2025-04-12 10:46
Severity ?
Summary
The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "81EE9433-C21F-4902-B37E-CF4FC1132B72", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." }, { "lang": "es", "value": "La capa Serf RA en Apache Subversion 1.4.0 hasta 1.7.x anterior a 1.7.18 y 1.8.x anterior a 1.8.10 no maneja debidamente los comodines (wildcards) en el campo Common Name (CN) o subjectAltName de un certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores a trav\u00e9s de un certificado manipulado." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/297.html\" target=\"_blank\"\u003eCWE-297: Improper Validation of Certificate with Host Mismatch\u003c/a\u003e", "id": "CVE-2014-3522", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-19T18:55:02.640", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59432" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59584" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60100" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60722" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/109996" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69237" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95090" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95311" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/109996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95090" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT204427" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-297" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-07 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "90CA8726-9C56-41CA-B0AD-D6A0877EDEE6", "versionEndIncluding": "1.6.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3BB33539-0E47-4FBC-B509-A80CB0525B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "41CAF981-A3D6-4732-A291-FB50D91EE172", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "62A88525-321D-4329-8B2C-2B912B0E13A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7A498782-9837-4CFD-BFF2-684AAF8CF5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "8BF7F7DF-DAB2-4456-9AFF-EA5DC6293115", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "B58F83FD-604A-43E2-8310-B0133EB8CE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F6E57BE-7D32-4838-9F1F-142F67ABB1A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "FD6FB430-467A-499A-A231-3ABDC49CF989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EFC95E7E-69C2-40A4-A337-C8DCC2296773", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "001D8708-8543-4CD8-9DD7-49304144BA99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "05F90085-6351-4792-8A5F-9B8F0AD66828", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "05583331-0A4A-405B-9B01-79E59CA6C6A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "2DA872BC-38F1-482D-A23D-31BD195A9859", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE048E8E-13FA-4487-8631-28449393F631", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "C287F1A7-6641-4005-8099-985BA1231619", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "9EC9B24B-100A-48B5-862A-6F6049F7E751", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "B0E02F3C-DF1F-49DE-8EF7-0AF1043C9EDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "63EC30E3-BB43-4DCB-A808-28E3A70559AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "853D4C9E-21FC-4411-B85D-F0625B370286", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "8BE82629-5207-4E90-B80C-71D85A80DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "1BE78B8E-CA40-4ADE-99BA-E83E7F4C28F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "E970D014-E037-46E0-BC4C-275EF1345036", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "C4E3CD50-3ED8-4B2B-8526-E7F8FB23BB64", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B216AE-069C-4A98-8F8C-ABFC3FFE2B16", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "matchCriteriaId": "7EBB65E0-E3D0-40E2-84EC-5210A482672A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "06B57B0B-BC24-442E-B9B5-7CA620687833", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "59089857-7F61-4112-8757-666C8ED5674E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "4D19CA9A-081B-499E-B3DE-F5C5D05DB156", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "577C74A5-E87E-4ABE-8673-ECBFAB782A38", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A3CF8AC-F42C-4365-944F-3BB99D090F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE674329-C25B-442C-9057-035AF25F1B98", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C011BE5-E603-4EED-B1A5-B5DA935CEB86", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "matchCriteriaId": "3D6BE30C-E4D4-4A7F-8BA0-F25DE9F6348F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "matchCriteriaId": "74421EC5-BD41-4F09-BBD3-7C5575B8A9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0E83DCB-0C73-4943-940D-355063A1F194", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "matchCriteriaId": "F33F16C3-326D-4F6E-87EB-25872A735567", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "matchCriteriaId": "B08E7421-BB83-41A7-9285-983165C2AC5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "matchCriteriaId": "59E55A2F-0CF6-4C9F-BC01-0041156F0D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "matchCriteriaId": "5E0A1C51-0684-4384-88C1-C7BDEB0413DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "matchCriteriaId": "B7379952-D4B6-4256-888D-F2CC2B05CB45", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "6555DBBD-0366-40FA-A772-6722B4D2888A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "matchCriteriaId": "803058ED-4566-4609-B250-7BA6AB6EE054", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "matchCriteriaId": "933F4E36-4B89-4C3C-9FAA-7A757CBBA3FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "matchCriteriaId": "41A31BD1-325F-4BEA-9D2F-17611032B44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "matchCriteriaId": "69324D9E-7223-4AE2-A950-EA32925544F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "00351004-8FE7-4C35-97B9-CA29BE5325E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*", "matchCriteriaId": "2872908F-4656-4F6F-9950-64978CE0B533", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6736466E-B29D-4E50-86BB-D3DD70AFA4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "matchCriteriaId": "70E23F84-C03A-4E95-AD7D-F42F3478F786", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0B7EF4A-5989-4EE9-8747-7605D4C0C8CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "638C8FFA-A26C-47B6-B9B2-A34B92639F2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7CBDEE8-5933-4468-AD9E-B63340353677", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "matchCriteriaId": "C70A147D-EB27-4EF4-A1E4-6B1D24D33B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "matchCriteriaId": "53BB268C-C29B-4200-96AE-5133B2DC1095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D75936BB-5BE4-4B8C-B2A0-2BE13B713AE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BFCE3B89-46A6-4D1F-AFB3-FCB6C3B66245", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4DFB08D-01C2-4D95-8EB2-81F5C27AC656", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A3625A8E-A326-4DCE-9CFB-B0E38FC54B6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "106C86D0-84D9-4F44-821F-FD0D49EB32E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "156DD5C1-C2C3-4AD7-B432-79CC3EC32B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "75551DEC-A2BE-453D-9ABA-B3041A2607C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "CB5A2F0A-E06E-40C6-98C1-4343AA9C2EFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "0FC70E13-59B6-4A75-9AF0-D38CCAB2D117", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8316A374-3E3E-4FBA-AB57-9244812C8E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0EB42901-B207-4B41-B09C-91153A19C7D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3DA7ADC-6A81-4250-B6E1-4E4425156941", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "83D766B5-5F07-44F1-A488-127D18510989", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2C8479EC-930C-47DB-9A02-E7B2F9101E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D1D47331-B23A-4A6E-8F14-74628F0E1846", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9E2C35C-FEBA-4525-8A38-9C170B34FA07", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A098CEF5-04BE-48C0-8414-AFC9D03771E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C39739A0-8C23-4167-B63D-1000F9D3B684", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0FD13E19-4B9C-4DBD-9339-7BFE5377689F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "35C2CFEF-2F6D-4F9A-9DDF-4CC6448BADC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6D04C072-7D90-428F-A226-BAD0105D22B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "856959BA-9945-4AA8-95D3-B3752C0D895D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "matchCriteriaId": "ADEF93A5-5D53-4EA7-8865-CA0EABC18A89", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "matchCriteriaId": "023127A5-04AD-4725-85EB-3D08C08DFB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "matchCriteriaId": "689E87D0-BAA7-420D-A700-C07376F312F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "matchCriteriaId": "D3073CF2-E398-408C-9782-702F83663557", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command." }, { "lang": "es", "value": "M\u00faltiples fugas de memoria en rev_hunt.c Subversion en Apache anteriores a v1.6.15, permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de demonio) a trav\u00e9s de la opci\u00f3n -g sobre el comando blame." } ], "id": "CVE-2010-4644", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-07T19:00:20.420", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42780" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/42969" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43115" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43139" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/43346" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1032808" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45655" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024935" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0162" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1032808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024935" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-12-07 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | mod_dav_svn | - | |
apache | subversion | 1.7.11 | |
apache | subversion | 1.7.12 | |
apache | subversion | 1.7.13 | |
apache | subversion | 1.8.1 | |
apache | subversion | 1.8.2 | |
apache | subversion | 1.8.3 | |
apache | subversion | 1.8.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:mod_dav_svn:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF1F71DC-F66A-4F20-AF88-636DEFBD30BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /." }, { "lang": "es", "value": "La funci\u00f3n get_parent_resource en respos.c en el m\u00f3dulo de servidor mod_dav_svn Apache HTTPD en Subversion 1.7.11 a 1.7.13 y 1.8.1 a 1.8.4, cuando se construyen con aserciones activas y SVNAutoversioning est\u00e1 habilitado, permite a atacantes remotos causar denegaci\u00f3n de servicio (fallo de aserci\u00f3n y aborto de proceso Apache) a trav\u00e9s de una URL no can\u00f3nica en una petici\u00f3n, como se muestra utilizando una \u0027/\u0027 final." } ], "id": "CVE-2013-4558", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-12-07T20:55:02.553", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/100363" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" }, { "source": "secalert@redhat.com", "url": "https://github.com/apache/subversion/commit/2c77c43e4255555f3b79f761f0d141393a3856cc" }, { "source": "secalert@redhat.com", "url": "https://github.com/apache/subversion/commit/647e3f8365a74831bb915f63793b63e31fae062d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/100363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/apache/subversion/commit/2c77c43e4255555f3b79f761f0d141393a3856cc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/apache/subversion/commit/647e3f8365a74831bb915f63793b63e31fae062d" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-12 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.8.1 | |
apache | subversion | 1.8.2 | |
apache | subversion | 1.8.3 | |
apache | subversion | 1.8.4 | |
apache | subversion | 1.8.5 | |
apache | subversion | 1.8.6 | |
apache | subversion | 1.8.7 | |
apache | subversion | 1.8.8 | |
apache | subversion | 1.8.9 | |
apache | subversion | 1.8.10 | |
apache | subversion | 1.8.11 | |
apache | subversion | 1.8.13 | |
apple | xcode | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "9158B9C3-7832-4D4F-B3CE-0E9CDDA4C9DF", "versionEndIncluding": "1.7.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "2A83933C-D270-4B9A-8D18-AC7302A5B86F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0E785D-FDCD-46DD-9BE9-049D6C1D6E1E", "versionEndIncluding": "7.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path." }, { "lang": "es", "value": "Vulnerabilidad en la funci\u00f3n svn_repos_trace_node_locations en Apache Subversion en versiones anteriores a 1.7.21 y 1.8.x en versiones anteriores a 1.8.14, cuando se utiliza autorizaci\u00f3n basada en ruta, permite a usuarios remotos autenticados obtener informaci\u00f3n de ruta sensible leyendo el historial de un nodo que ha sido movido desde una ruta oculta." } ], "id": "CVE-2015-3187", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-12T14:59:12.150", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/76273" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1033215" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206172" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-08-11 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.9.0 | |
apache | subversion | 1.9.1 | |
apache | subversion | 1.9.2 | |
apache | subversion | 1.9.3 | |
apache | subversion | 1.9.4 | |
apache | subversion | 1.9.5 | |
apache | subversion | 1.9.6 | |
apache | subversion | 1.10.0 | |
apache | subversion | 1.10.0 | |
apache | subversion | 1.10.0 | |
apache | subversion | 1.10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10F0402-14B0-4870-91A0-53BA3200B2B1", "versionEndIncluding": "1.8.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "892FF423-1848-4E69-8C4C-E1972B656196", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "74200C33-9505-48EB-964D-6CA28C7F6DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "09FBAFE7-986D-4B24-8122-FDCC380331C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "32B6148E-3E5F-4DCB-BD8E-45B3D56CB18C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA37FBDF-C9BD-4D8F-B24A-CC35DF7EE7FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "E228BEF8-CACB-46DF-816B-ECCB406DFB60", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDEDF94B-8B94-43AD-8DA7-580EF40CAD26", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.10.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "8053093C-E4F4-411B-A4B7-1728E40E7D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.10.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "6997704A-5C87-47B7-BF17-5C0F43642065", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.10.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "B1E5C581-41D7-4694-A050-5455D6C8BB74", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server\u0027s repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://." }, { "lang": "es", "value": "Una URL creada con fines maliciosos svn+ssh:// podr\u00eda provocar que clientes de Subversion en versiones anteriores a la 1.8.19, en versiones 1.9.x anteriores a la 1.9.7, y en versiones 1.10.0.x a 1.10.0-alpha3 ejecuten un comando shell arbitrario. Tal URL podr\u00eda ser generada por un servidor malicioso, por un usuario malicioso que se confirma en un servidor honesto (para atacar otro usuario de los repositorios de ese servidor), o por un servidor proxy. La vulnerabilidad afecta a todos los clientes, incluyendo aquellos que usan file://, http://, y svn:// plano (sin t\u00fanel)." } ], "id": "CVE-2017-9800", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-11T21:29:00.587", "references": [ { "source": "security@apache.org", "url": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html" }, { "source": "security@apache.org", "url": "http://www.debian.org/security/2017/dsa-3932" }, { "source": "security@apache.org", "url": "http://www.securityfocus.com/archive/1/540999/100/0/threaded" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100259" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039127" }, { "source": "security@apache.org", "url": "https://access.redhat.com/errata/RHSA-2017:2480" }, { "source": "security@apache.org", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E" }, { "source": "security@apache.org", "url": "https://security.gentoo.org/glsa/201709-09" }, { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt" }, { "source": "security@apache.org", "url": "https://support.apple.com/HT208103" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2017/dsa-3932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/540999/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:2480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201709-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/HT208103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL." }, { "lang": "es", "value": "El modulo mod_dav_svn Apache HTTPD server en Subversion v1.6.x hasta v1.6.20 y v1.7.0 hasta v1.7.8 permite a atacantes remotos causar una denegaci\u00f3n de servicio (referencia NULL y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una petici\u00f3n PROPFIND para una URL vigente.\r\n" } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2013-1849", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.377", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2013/Mar/56" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929093" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2013/Mar/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18980" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-05-05 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.9.0 | |
apache | subversion | 1.9.1 | |
apache | subversion | 1.9.2 | |
apache | subversion | 1.9.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD9BA15E-397D-4B1F-B755-8FFBBF58AE59", "versionEndIncluding": "1.8.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "892FF423-1848-4E69-8C4C-E1972B656196", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "74200C33-9505-48EB-964D-6CA28C7F6DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "09FBAFE7-986D-4B24-8122-FDCC380331C9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check." }, { "lang": "es", "value": "La funci\u00f3n req_check_access en el m\u00f3dulo mod_authz_svn en el servidor httpd en Apache Subversion en versiones anteriores a 1.8.16 y 1.9.x en versiones anteriores a 1.9.4 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda) a trav\u00e9s de una cabecera manipulada en una petici\u00f3n (1) MOVE o (2) COPY, involucrando una verificaci\u00f3n de autorizaci\u00f3n." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e", "id": "CVE-2016-2168", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-05-05T18:59:01.710", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/89320" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1035707" }, { "source": "secalert@redhat.com", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/89320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1035707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-12 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC0E785D-FDCD-46DD-9BE9-049D6C1D6E1E", "versionEndIncluding": "7.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*", "matchCriteriaId": "7F5C25F7-0A02-4974-8144-839955C373C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "2A83933C-D270-4B9A-8D18-AC7302A5B86F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "046487A3-752B-4D0F-8984-96486B828EAB", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "89D2E052-51CD-4B57-A8B8-FAE51988D654", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "EAA27058-BACF-4F94-8E3C-7D38EC302EC1", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "E7D924D1-8A36-4C43-9E56-52814F9A6350", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "39CDFECC-E26D-47E0-976F-6629040B3764", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "E3ECBCB1-0675-41F5-857B-438F36925F63", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "69CB1C41-0360-44D0-B73A-273B0DDE46D5", "vulnerable": false }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name." }, { "lang": "es", "value": "Vulnerabilidad en mod_authz_svn en Apache Subversion 1.7.x en versiones anteriores a 1.7.21 y 1.8.x en versiones anteriores a 1.8.14, al utilizar Apache httpd 2.4.x, no restringe correctamente el acceso an\u00f3nimo, lo que permite a usuarios an\u00f3nimos remotos leer archivos ocultos a trav\u00e9s del nombre de la ruta." } ], "id": "CVE-2015-3184", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-12T14:59:10.997", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/76274" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1033215" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/76274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033215" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT206172" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-05-02 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.6.0 | |
apache | subversion | 1.6.1 | |
apache | subversion | 1.6.2 | |
apache | subversion | 1.6.3 | |
apache | subversion | 1.6.4 | |
apache | subversion | 1.6.5 | |
apache | subversion | 1.6.6 | |
apache | subversion | 1.6.7 | |
apache | subversion | 1.6.8 | |
apache | subversion | 1.6.9 | |
apache | subversion | 1.6.10 | |
apache | subversion | 1.6.11 | |
apache | subversion | 1.6.12 | |
apache | subversion | 1.6.13 | |
apache | subversion | 1.6.14 | |
apache | subversion | 1.6.15 | |
apache | subversion | 1.6.16 | |
apache | subversion | 1.6.17 | |
apache | subversion | 1.6.18 | |
apache | subversion | 1.6.19 | |
apache | subversion | 1.6.20 | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 | |
opensuse | opensuse | 12.1 | |
opensuse | opensuse | 12.2 | |
opensuse | opensuse | 12.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory." }, { "lang": "es", "value": "El modulo mod_dav_svn Apache HTTPD server en Subversion v1.6.x hasta v1.6.21 y v1.7.0 hasta v1.7.8 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio ((consumo de memoria) mediante un (1) \"setting\" o (2) \"deleting\" en un numero largo de propiedades de un archivo o directorio." } ], "evaluatorImpact": "Per http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html\r\n\"Affected Products:\r\nopenSUSE 12.3\r\nopenSUSE 12.2\r\nopenSUSE 12.1\"", "id": "CVE-2013-1845", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-05-02T14:55:05.307", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929082" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929082" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18973" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-04-08 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*", "matchCriteriaId": "AA856400-1B48-429A-94A0-173B7EEE1EC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7344422F-F65A-4000-A9EF-8D323DA29011", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences." }, { "lang": "es", "value": "El servidor mod_dav_svn en Subversion 1.5.0 hasta 1.7.19 y 1.8.0 hasta 1.8.11 permite a usuarios remotos autenticados falsificar la propiedad svn:author a trav\u00e9s de secuencias manipuladas de solicitudes del protocolo v1 HTTP." } ], "id": "CVE-2015-0251", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-08T18:59:02.843", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/fulldisclosure/2015/Jun/32" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/74259" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1033214" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT205217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2015/Jun/32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/74259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1033214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT205217" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-14 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | 1.8.0 | |
apache | subversion | 1.8.1 | |
apache | subversion | 1.8.2 | |
apache | subversion | 1.8.3 | |
apache | subversion | 1.8.4 | |
apache | subversion | 1.8.5 | |
apache | subversion | * | |
apache | subversion | 1.7.0 | |
apache | subversion | 1.7.1 | |
apache | subversion | 1.7.2 | |
apache | subversion | 1.7.3 | |
apache | subversion | 1.7.4 | |
apache | subversion | 1.7.5 | |
apache | subversion | 1.7.6 | |
apache | subversion | 1.7.7 | |
apache | subversion | 1.7.8 | |
apache | subversion | 1.7.9 | |
apache | subversion | 1.7.10 | |
apache | subversion | 1.7.11 | |
apache | subversion | 1.7.12 | |
apache | subversion | 1.7.13 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "198015D3-ACD5-4471-9BA8-449995FBD6A8", "versionEndIncluding": "1.7.14", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the \"svn ls http://svn.example.com\" command." }, { "lang": "es", "value": "la funci\u00f3n get_resource en repos.c en el m\u00f3dulo mod_dav_svn en Apache Subversion anterior a 1.7.15 y 1.8.x anterior a 1.8.6, cuando SVNListParentPath est\u00e1 habilitado, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores relacionados con la ra\u00edz del servidor y solicitudes diferentes a GET, tal como se ha demostrado con el comando \"svn ls http://svn.example.com\"." } ], "id": "CVE-2014-0032", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-14T15:55:05.907", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E" }, { "source": "secalert@redhat.com", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56822" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60722" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61321" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT6444" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES" }, { "source": "secalert@redhat.com", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/102927" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/65434" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90986" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT6444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/102927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-26 16:15
Modified
2024-11-21 04:16
Severity ?
Summary
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://subversion.apache.org/security/CVE-2019-0203-advisory.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2019-0203-advisory.txt | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | 1.12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50DD0181-B9AA-42E5-813E-8912532052BB", "versionEndIncluding": "1.9.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "198D8E5E-4D92-43C4-8C30-C940255B4FB0", "versionEndIncluding": "1.10.4", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45E5978-D958-44EB-8434-63078915B03C", "versionEndIncluding": "1.11.1", "versionStartIncluding": "1.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60BCD44-BA16-4A6F-9B4D-2BA89601C76F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server." }, { "lang": "es", "value": "En Apache Subversion versiones hasta 1.9.10, 1.10.4, 1.12.0 incluy\u00e9ndolas, el proceso del servidor svnserve de Subversion puede cerrarse cuando un cliente env\u00eda determinadas secuencias de comandos de protocolo. Esto puede conllevar a interrupciones para los usuarios del servidor." } ], "id": "CVE-2019-0203", "lastModified": "2024-11-21T04:16:28.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-26T16:15:10.440", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" }, { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-09 13:15
Modified
2025-02-11 17:22
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.
All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.
Subversion is not affected on UNIX-like platforms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1FD34E-4CF2-4750-865B-A1F542D1383B", "versionEndExcluding": "1.14.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms." }, { "lang": "es", "value": "En las plataformas Windows, una conversi\u00f3n de codificaci\u00f3n de caracteres de \"ajuste \u00f3ptimo\" de argumentos de l\u00ednea de comandos a ejecutables de Subversion (por ejemplo, svn.exe, etc.) puede provocar una interpretaci\u00f3n inesperada de los argumentos de l\u00ednea de comandos, incluida la inyecci\u00f3n de argumentos y la ejecuci\u00f3n de otros programas, si se procesa una cadena de argumentos de l\u00ednea de comandos especialmente manipulada. Todas las versiones de Subversion hasta Subversion 1.14.3 incluida se ven afectadas solo en plataformas Windows. Se recomienda a los usuarios actualizar a la versi\u00f3n Subversion 1.14.4, que soluciona este problema. Subversion no se ve afectado en plataformas tipo UNIX." } ], "id": "CVE-2024-45720", "lastModified": "2025-02-11T17:22:19.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "security@apache.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-09T13:15:11.337", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2024-45720-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/10/08/3" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "security@apache.org", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-19 18:55
Modified
2025-04-12 10:46
Severity ?
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "13109084-931E-4565-BEE5-794B83E6978D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "726B9C10-ACD5-41C2-A552-FD0046A75966", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "87D72A75-EDB9-4AD1-B6FC-8A918804DE0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "B55A7A26-C994-4956-BBE7-BF3A51971295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9E26AB-915A-477F-BA5C-10965A7098F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "DFD49A9B-16A7-4362-8D62-6EB5ECBE4296", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B0CB798-F4ED-44E5-9B15-B7009EAC6303", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "67130DAF-AE81-43D2-A208-58A53746A7E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F8426-38CB-46B4-B0D0-8D16B48DD53F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "90631FFA-9AB2-483D-B162-31A47428D280", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BD5A981-3FDD-4E74-8EB2-5F324246FFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "341F900B-5179-4CB4-9F41-91B58B29C414", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*", "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*", "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:serf_project:serf:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C21755B4-DD67-4627-A68C-0610C8A6BDF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "488A8919-6AF9-42DE-95EA-1FD88B1CAC9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "58A9D863-6109-40AA-8EB6-19005C079949", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "20C10025-226B-43C1-92AD-98828068335A", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9F45437-9585-4343-A4ED-305B9385FCB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1725E97A-91EA-4A14-81DD-BD8030EC10E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "44BB3DA5-553A-416D-95F0-F6D5C2CB8D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0738681-DDFF-4972-9619-6C3759E7CD99", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5818C3C-C1A9-4181-9C55-F2848C2D1764", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EBF4EA90-FDC1-422D-A0D3-47475632E214", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD2C28DC-2535-4657-9A01-86A722AB1713", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "44032AB1-E4BE-4C81-9E41-333DB1424542", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7114C9C-22DE-49D8-BB52-D6B19E6D9214", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CFCC6E9B-1D99-4A5B-B86F-1A120071A7EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F0CD9B1-DF96-4A74-B33A-FF32B74ECA3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2C04EB3-5E79-4C76-8698-3053CFF5CE5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D91AAA48-666E-4328-8F75-C2A809242270", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0E579CE5-7A14-42F1-9BE2-E981C23AB02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "54F6BE6E-D180-4256-9E43-6C3061D4A6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7CD3DA28-9446-41A0-88BB-C8B7F649600B", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "48475524-3713-480F-B2D0-03E47F89EDE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "15774804-BBF7-4CEB-9560-014C3DC4549F", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "72751936-EF52-41AB-8BC4-1F9D997074E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "ADB8D29C-6821-4509-BC70-E9DC80A4809F", "vulnerable": true }, { "criteria": "cpe:2.3:a:serf_project:serf:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "46B6D1C7-12AE-4F2C-AEF5-37CFC966E05E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." }, { "lang": "es", "value": "Las funciones (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate en Serf 0.2.0 hasta 1.3.x anterior a 1.3.7 no manejan debidamente un byte NUL en un nombre de dominio en el campo del asunto Common Name (CN) de un certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL arbitrarios a trav\u00e9s de un certificado manipulado emitido por una autoridad de certificaci\u00f3n leg\u00edtima." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/297.html\" target=\"_blank\"\u003eCWE-297: Improper Validation of Certificate with Host Mismatch\u003c/a\u003e", "id": "CVE-2014-3504", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-19T18:55:02.217", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59584" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60721" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69238" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201610-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-05 17:29
Modified
2024-11-21 03:44
Severity ?
Summary
Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.
References
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.securityfocus.com/bid/106770 | Broken Link, Third Party Advisory, VDB Entry | |
security@apache.org | https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E | ||
security@apache.org | https://security.gentoo.org/glsa/201904-08 | Third Party Advisory | |
security@apache.org | https://usn.ubuntu.com/3869-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106770 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201904-08 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3869-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | 1.11.0 | |
canonical | ubuntu_linux | 18.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3DE44D-BE33-4BF4-A0AE-FD17611252C6", "versionEndIncluding": "1.10.3", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "04E166FE-E69F-43A0-B5F2-C704411C115F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation." }, { "lang": "es", "value": "El m\u00f3dulo Apache HTTPD \"mod_dav_svn\" de Subversion, en versiones 1.10.0 y desde la 1.10.3 hasta la 1.11.0, se cerrar\u00e1 de manera inesperada despu\u00e9s de desreferenciar un puntero no inicializado si el cliente omite la ruta \"root\" en una operaci\u00f3n de listado de un directorio recursivo." } ], "id": "CVE-2018-11803", "lastModified": "2024-11-21T03:44:03.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-05T17:29:00.327", "references": [ { "source": "security@apache.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106770" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201904-08" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3869-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201904-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3869-1/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-824" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2024-45720 (GCVE-0-2024-45720)
Vulnerability from cvelistv5
Published
2024-10-09 12:38
Modified
2024-10-09 13:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.
All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.
Subversion is not affected on UNIX-like platforms.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 1.0.0 ≤ 1.14.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-10-09T13:07:31.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/10/08/3" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "subversion", "vendor": "apache", "versions": [ { "lessThanOrEqual": "1.14.3", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-45720", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T13:20:38.607682Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T13:27:02.868Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "1.14.3", "status": "affected", "version": "1.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Orange Tsai (@orange_8361) from DEVCORE Research Team" }, { "lang": "en", "type": "finder", "value": "splitline (@_splitline_) from DEVCORE Research Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\u003cbr\u003e\u003cbr\u003eAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\u003cbr\u003e\u003cbr\u003e\u003cdiv\u003eSubversion is not affected on UNIX-like platforms.\u003c/div\u003e\u003cbr\u003e" } ], "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion\u0027s executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-09T12:38:28.971Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://subversion.apache.org/security/CVE-2024-45720-advisory.txt" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Subversion: Command line argument injection on Windows platforms", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-45720", "datePublished": "2024-10-09T12:38:28.971Z", "dateReserved": "2024-09-05T11:42:42.423Z", "dateUpdated": "2024-10-09T13:27:02.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3504 (GCVE-0-2014-3504)
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 10:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.340Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2315-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60721" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2315-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60721" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3504", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2315-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-2315-1" }, { "name": "69238", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69238" }, { "name": "60721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60721" }, { "name": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "name": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc" }, { "name": "openSUSE-SU-2014:1059", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59584" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3504", "datePublished": "2014-08-19T18:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:43:06.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-2168 (GCVE-0-2016-2168)
Vulnerability from cvelistv5
Published
2016-05-05 18:00
Modified
2024-08-05 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2016-20cc04ac50", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "1035707", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035707" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "name": "89320", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/89320" }, { "name": "openSUSE-SU-2016:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:50", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2016-20cc04ac50", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "1035707", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035707" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "name": "89320", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/89320" }, { "name": "openSUSE-SU-2016:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2168", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-20cc04ac50", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "1035707", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035707" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E" }, { "name": "89320", "refsource": "BID", "url": "http://www.securityfocus.com/bid/89320" }, { "name": "openSUSE-SU-2016:1263", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2016-2168-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2168", "datePublished": "2016-05-05T18:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2112 (GCVE-0-2013-2112)
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "oval:org.mitre.oval:def:19057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19057" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt" }, { "name": "DSA-2703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "oval:org.mitre.oval:def:19057", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19057" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt" }, { "name": "DSA-2703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "oval:org.mitre.oval:def:19057", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19057" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-2112-advisory.txt" }, { "name": "DSA-2703", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "openSUSE-SU-2013:1139", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2112", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0251 (GCVE-0-2015-0251)
Vulnerability from cvelistv5
Published
2015-04-08 18:00
Modified
2024-08-06 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.727Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "20150611 Apache vulnerability program faulting module ntdll.dll", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/32" }, { "name": "74259", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74259" }, { "name": "1033214", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-20T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "20150611 Apache vulnerability program faulting module ntdll.dll", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Jun/32" }, { "name": "74259", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74259" }, { "name": "1033214", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1742", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "20150611 Apache vulnerability program faulting module ntdll.dll", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Jun/32" }, { "name": "74259", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74259" }, { "name": "1033214", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033214" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0251", "datePublished": "2015-04-08T18:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9800 (GCVE-0-2017-9800)
Vulnerability from cvelistv5
Published
2017-08-11 21:00
Modified
2024-09-16 23:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 1.0.0 to 1.8.18 Version: 1.9.0 to 1.9.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[announce] 20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E" }, { "name": "100259", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100259" }, { "name": "20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540999/100/0/threaded" }, { "name": "RHSA-2017:2480", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2480" }, { "name": "1039127", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039127" }, { "name": "GLSA-201709-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201709-09" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "name": "[subversion-commits] 20190830 svn commit: r1866117 - in /subversion/site/publish/docs/community-guide: how-to-roll-releases-in-private.txt issues.part.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208103" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.0.0 to 1.8.18" }, { "status": "affected", "version": "1.9.0 to 1.9.6" } ] } ], "datePublic": "2017-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server\u0027s repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:52", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[announce] 20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E" }, { "name": "100259", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100259" }, { "name": "20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/540999/100/0/threaded" }, { "name": "RHSA-2017:2480", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2480" }, { "name": "1039127", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039127" }, { "name": "GLSA-201709-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201709-09" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "name": "[subversion-commits] 20190830 svn commit: r1866117 - in /subversion/site/publish/docs/community-guide: how-to-roll-releases-in-private.txt issues.part.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208103" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-08-10T00:00:00", "ID": "CVE-2017-9800", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "1.0.0 to 1.8.18" }, { "version_value": "1.9.0 to 1.9.6" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server\u0027s repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "[announce] 20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63@%3Cannounce.apache.org%3E" }, { "name": "100259", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100259" }, { "name": "20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540999/100/0/threaded" }, { "name": "RHSA-2017:2480", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2480" }, { "name": "1039127", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039127" }, { "name": "GLSA-201709-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201709-09" }, { "name": "DSA-3932", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3932" }, { "name": "[subversion-commits] 20190830 svn commit: r1866117 - in /subversion/site/publish/docs/community-guide: how-to-roll-releases-in-private.txt issues.part.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html" }, { "name": "https://support.apple.com/HT208103", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208103" }, { "name": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2017-9800-advisory.txt" }, { "name": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-9800", "datePublished": "2017-08-11T21:00:00Z", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-09-16T23:36:59.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4539 (GCVE-0-2010-4539)
Vulnerability from cvelistv5
Published
2011-01-07 18:00
Modified
2024-08-07 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:51:17.173Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "subversion-walk-dos(64472)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "name": "ADV-2011-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "name": "42969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42969" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "name": "42780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "name": "[oss-security] 20110105 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "name": "[oss-security] 20110103 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/03/9" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43346" }, { "name": "1024934", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024934" }, { "name": "43115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43115" }, { "name": "FEDORA-2011-0099", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "name": "ADV-2011-0015", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "name": "[oss-security] 20110102 CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "RHSA-2011:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "name": "MDVSA-2011:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1033166" }, { "name": "45655", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45655" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43139" }, { "name": "[subversion-users] 20101104 apache coredump in mod_dav_svn", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E" }, { "name": "ADV-2011-0162", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "subversion-walk-dos(64472)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64472" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "name": "ADV-2011-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "name": "42969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42969" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "name": "42780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "name": "[oss-security] 20110105 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "name": "[oss-security] 20110103 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/03/9" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43346" }, { "name": "1024934", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024934" }, { "name": "43115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43115" }, { "name": "FEDORA-2011-0099", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "name": "ADV-2011-0015", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "name": "[oss-security] 20110102 CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "RHSA-2011:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "name": "MDVSA-2011:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1033166" }, { "name": "45655", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45655" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667407" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43139" }, { "name": "[subversion-users] 20101104 apache coredump in mod_dav_svn", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E" }, { "name": "ADV-2011-0162", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0162" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4539", "datePublished": "2011-01-07T18:00:00", "dateReserved": "2010-12-09T00:00:00", "dateUpdated": "2024-08-07T03:51:17.173Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1884 (GCVE-0-2013-1884)
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:36.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt" }, { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929095" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "oval:org.mitre.oval:def:18788", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18788" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt" }, { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929095" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "oval:org.mitre.oval:def:18788", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18788" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1884", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-1884-advisory.txt" }, { "name": "openSUSE-SU-2013:0687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929095", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929095" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "oval:org.mitre.oval:def:18788", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18788" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "MDVSA-2013:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1884", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:36.261Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3187 (GCVE-0-2015-3187)
Vulnerability from cvelistv5
Published
2015-08-12 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt" }, { "name": "76273", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76273" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt" }, { "name": "76273", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76273" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1742", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "RHSA-2015:1633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "https://support.apple.com/HT206172", "refsource": "CONFIRM", "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "name": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-3187-advisory.txt" }, { "name": "76273", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76273" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3187", "datePublished": "2015-08-12T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4262 (GCVE-0-2013-4262)
Vulnerability from cvelistv5
Published
2014-07-28 19:00
Modified
2024-08-06 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-14T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4262", "datePublished": "2014-07-28T19:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3528 (GCVE-0-2014-3528)
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:16.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "59432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204427" }, { "name": "68995", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/68995" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60722" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "59432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204427" }, { "name": "68995", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/68995" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60722" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3528", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59432", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "RHSA-2015:0166", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "name": "https://support.apple.com/HT204427", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204427" }, { "name": "68995", "refsource": "BID", "url": "http://www.securityfocus.com/bid/68995" }, { "name": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2014-3528-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "60722", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60722" }, { "name": "openSUSE-SU-2014:1059", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59584" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3528", "datePublished": "2014-08-19T18:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:16.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3580 (GCVE-0-2014-3580)
Vulnerability from cvelistv5
Published
2014-12-18 15:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3107", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3107" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204427" }, { "name": "71726", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71726" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "61131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-22T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-3107", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3107" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204427" }, { "name": "71726", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71726" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "61131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3107", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3107" }, { "name": "RHSA-2015:0166", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "name": "https://support.apple.com/HT204427", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204427" }, { "name": "71726", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71726" }, { "name": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2014-3580-advisory.txt" }, { "name": "APPLE-SA-2015-03-09-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "RHSA-2015:0165", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0165.html" }, { "name": "61131", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3580", "datePublished": "2014-12-18T15:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2088 (GCVE-0-2013-2088)
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18772", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18772" }, { "name": "40507", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40507/" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18772", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18772" }, { "name": "40507", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40507/" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-2088-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18772", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18772" }, { "name": "40507", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40507/" }, { "name": "openSUSE-SU-2013:1139", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2088", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:40.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-28544 (GCVE-0-2021-28544)
Vulnerability from cvelistv5
Published
2022-04-12 17:50
Modified
2024-08-03 21:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 1.10.0 to 1.14.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:47:32.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt" }, { "name": "DSA-5119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.10.0 to 1.14.1" } ] } ], "credits": [ { "lang": "en", "value": "Apache Subversion would like to thank Evgeny Kotkov, visualsvn.com." } ], "descriptions": [ { "lang": "en", "value": "Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal \u0027copyfrom\u0027 paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the \u0027copyfrom\u0027 path of the original. This also reveals the fact that the node was copied. Only the \u0027copyfrom\u0027 path is revealed; not its contents. Both httpd and svnserve servers are vulnerable." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-20T13:11:27.211Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt" }, { "name": "DSA-5119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Subversion SVN authz protected copyfrom paths regression", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-28544", "STATE": "PUBLIC", "TITLE": "Apache Subversion SVN authz protected copyfrom paths regression" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "1.10.0 to 1.14.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache Subversion would like to thank Evgeny Kotkov, visualsvn.com." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal \u0027copyfrom\u0027 paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the \u0027copyfrom\u0027 path of the original. This also reveals the fact that the node was copied. Only the \u0027copyfrom\u0027 path is revealed; not its contents. Both httpd and svnserve servers are vulnerable." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt", "refsource": "MISC", "url": "https://subversion.apache.org/security/CVE-2021-28544-advisory.txt" }, { "name": "DSA-5119", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "name": "https://support.apple.com/kb/HT213345", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-28544", "datePublished": "2022-04-12T17:50:13", "dateReserved": "2021-03-16T00:00:00", "dateUpdated": "2024-08-03T21:47:32.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4558 (GCVE-0-2013-4558)
Vulnerability from cvelistv5
Published
2013-12-07 20:00
Modified
2024-08-06 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.812Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" }, { "name": "100363", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/100363" }, { "name": "openSUSE-SU-2013:1836", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "tags": [ "x_transferred" ], "url": "https://github.com/apache/subversion/commit/2c77c43e4255555f3b79f761f0d141393a3856cc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/apache/subversion/commit/647e3f8365a74831bb915f63793b63e31fae062d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-28T13:54:36.791Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" }, { "name": "100363", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/100363" }, { "name": "openSUSE-SU-2013:1836", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" }, { "url": "https://github.com/apache/subversion/commit/2c77c43e4255555f3b79f761f0d141393a3856cc" }, { "url": "https://github.com/apache/subversion/commit/647e3f8365a74831bb915f63793b63e31fae062d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033431" }, { "name": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-4558-advisory.txt" }, { "name": "100363", "refsource": "OSVDB", "url": "http://osvdb.org/100363" }, { "name": "openSUSE-SU-2013:1836", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4558", "datePublished": "2013-12-07T20:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1845 (GCVE-0-2013-1845)
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929082" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "oval:org.mitre.oval:def:18973", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18973" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929082" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "oval:org.mitre.oval:def:18973", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18973" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1845", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929082", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929082" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "oval:org.mitre.oval:def:18973", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18973" }, { "name": "MDVSA-2013:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" }, { "name": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-1845-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1845", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1847 (GCVE-0-2013-1847)
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929090" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18538" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929090" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18538", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18538" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1847", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929090", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929090" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-1847-advisory.txt" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18538", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18538" }, { "name": "openSUSE-SU-2013:0932", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1847", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-17525 (GCVE-0-2020-17525)
Vulnerability from cvelistv5
Published
2021-03-17 09:20
Modified
2025-02-13 16:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-476 - NULL Pointer Dereference
Summary
Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: mod_authz_svn < 1.14.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:00:48.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" }, { "name": "[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "unaffected", "version": "mod_authz_svn 1.10.7" }, { "lessThan": "1.14.1", "status": "affected", "version": "mod_authz_svn", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thomas \u00c5kesson (simonsoft.se)" } ], "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-04T14:01:40.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" }, { "name": "[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Remote unauthenticated denial-of-service in Subversion mod_authz_svn", "workarounds": [ { "lang": "en", "value": "As a workaround, the use of in-repository authz rules files with the AuthzSVNReposRelativeAccessFile can be avoided by switching to an alternative configuration which fetches an authz rules file from the server\u0027s filesystem, rather than from an SVN repository." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2020-17525", "STATE": "PUBLIC", "TITLE": "Remote unauthenticated denial-of-service in Subversion mod_authz_svn" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "mod_authz_svn", "version_value": "1.14.1" }, { "version_affected": "!", "version_name": "mod_authz_svn", "version_value": "1.10.7" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thomas \u00c5kesson (simonsoft.se)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Subversion\u0027s mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt", "refsource": "MISC", "url": "https://subversion.apache.org/security/CVE-2020-17525-advisory.txt" }, { "name": "[debian-lts-announce] 20210504 [SECURITY] [DLA 2646-1] subversion security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00000.html" } ] }, "source": { "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "As a workaround, the use of in-repository authz rules files with the AuthzSVNReposRelativeAccessFile can be avoided by switching to an alternative configuration which fetches an authz rules file from the server\u0027s filesystem, rather than from an SVN repository." } ] } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2020-17525", "datePublished": "2021-03-17T09:20:14.000Z", "dateReserved": "2020-08-12T00:00:00.000Z", "dateUpdated": "2025-02-13T16:27:35.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1752 (GCVE-0-2011-1752)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45162" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44681" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "name": "44879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44879" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44633" }, { "name": "oval:org.mitre.oval:def:18922", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922" }, { "name": "1025617", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025617" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "RHSA-2011:0861", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0861.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45162" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44681" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-1752-advisory.txt" }, { "name": "44879", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44879" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709111" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44633" }, { "name": "oval:org.mitre.oval:def:18922", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922" }, { "name": "1025617", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025617" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" }, { "name": "RHSA-2011:0861", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0861.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1752", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1968 (GCVE-0-2013-1968)
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt" }, { "name": "DSA-2703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "oval:org.mitre.oval:def:18986", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18986" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt" }, { "name": "DSA-2703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "oval:org.mitre.oval:def:18986", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18986" }, { "name": "openSUSE-SU-2013:1139", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1968", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[subversion-announce] 20130531 Subversion 1.6.23 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvTxsMFeHgc8bK2V-2PrSrKoBffTi8%2BxbHA5tocrrewWew%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130531 Apache Subversion 1.7.10 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201305.mbox/%3CCADkdwvRK51pQsybfvsAzjxQJrmVpL0fEa1K4WGkUP9Tzz6KFDw%40mail.gmail.com%3E" }, { "name": "RHSA-2014:0255", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-1968-advisory.txt" }, { "name": "DSA-2703", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2703" }, { "name": "oval:org.mitre.oval:def:18986", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18986" }, { "name": "openSUSE-SU-2013:1139", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1968", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4131 (GCVE-0-2013-4131)
Vulnerability from cvelistv5
Published
2013-07-31 10:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "61454", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61454" }, { "name": "oval:org.mitre.oval:def:18621", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18621" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=986194" }, { "name": "apache-subversion-cve20134131-dos(85983)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85983" }, { "name": "openSUSE-SU-2013:1286", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "61454", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61454" }, { "name": "oval:org.mitre.oval:def:18621", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18621" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=986194" }, { "name": "apache-subversion-cve20134131-dos(85983)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85983" }, { "name": "openSUSE-SU-2013:1286", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "61454", "refsource": "BID", "url": "http://www.securityfocus.com/bid/61454" }, { "name": "oval:org.mitre.oval:def:18621", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18621" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=986194", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=986194" }, { "name": "apache-subversion-cve20134131-dos(85983)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85983" }, { "name": "openSUSE-SU-2013:1286", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00000.html" }, { "name": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-4131-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4131", "datePublished": "2013-07-31T10:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:30:50.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-3522 (GCVE-0-2014-3522)
Vulnerability from cvelistv5
Published
2014-08-19 18:00
Modified
2024-08-06 10:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:16.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "59432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204427" }, { "name": "109996", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/109996" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "apache-subversion-cve20143522-spoofing(95311)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "name": "60100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60100" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60722" }, { "name": "69237", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69237" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "apache-subversion-cve20143528-info-disc(95090)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95090" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "59432", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204427" }, { "name": "109996", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/109996" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "apache-subversion-cve20143522-spoofing(95311)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "name": "60100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60100" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60722" }, { "name": "69237", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69237" }, { "name": "openSUSE-SU-2014:1059", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59584" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "apache-subversion-cve20143528-info-disc(95090)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95090" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3522", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59432", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59432" }, { "name": "USN-2316-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "https://support.apple.com/HT204427", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204427" }, { "name": "109996", "refsource": "OSVDB", "url": "http://www.osvdb.org/109996" }, { "name": "APPLE-SA-2015-03-09-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "apache-subversion-cve20143522-spoofing(95311)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95311" }, { "name": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2014-3522-advisory.txt" }, { "name": "60100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60100" }, { "name": "60722", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60722" }, { "name": "69237", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69237" }, { "name": "openSUSE-SU-2014:1059", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "59584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59584" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "name": "apache-subversion-cve20143528-info-disc(95090)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95090" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3522", "datePublished": "2014-08-19T18:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:16.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4505 (GCVE-0-2013-4505)
Vulnerability from cvelistv5
Published
2013-12-07 20:00
Modified
2024-08-06 16:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55855" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" }, { "name": "100364", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/100364" }, { "name": "openSUSE-SU-2013:1836", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-17T15:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "55855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55855" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" }, { "name": "100364", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/100364" }, { "name": "openSUSE-SU-2013:1836", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "55855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55855" }, { "name": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-4505-advisory.txt" }, { "name": "100364", "refsource": "OSVDB", "url": "http://osvdb.org/100364" }, { "name": "openSUSE-SU-2013:1836", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00029.html" }, { "name": "openSUSE-SU-2013:1860", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00048.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4505", "datePublished": "2013-12-07T20:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24070 (GCVE-0-2022-24070)
Vulnerability from cvelistv5
Published
2022-04-12 17:50
Modified
2024-08-03 03:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 1.10.0 to 1.14.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:59:23.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://issues.apache.org/jira/browse/SVN-4880" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife" }, { "name": "DSA-5119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.10.0 to 1.14.1" } ] } ], "credits": [ { "lang": "en", "value": "Apache Subversion would like to thank Thomas Wei\u00dfschuh, cis-solutions.eu." } ], "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-22T05:06:35", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://issues.apache.org/jira/browse/SVN-4880" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife" }, { "name": "DSA-5119", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Subversion mod_dav_svn is vulnerable to memory corruption", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-24070", "STATE": "PUBLIC", "TITLE": "Apache Subversion mod_dav_svn is vulnerable to memory corruption" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "1.10.0 to 1.14.1" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Apache Subversion would like to thank Thomas Wei\u00dfschuh, cis-solutions.eu." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Subversion\u0027s mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416 Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://issues.apache.org/jira/browse/SVN-4880", "refsource": "MISC", "url": "https://issues.apache.org/jira/browse/SVN-4880" }, { "name": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861", "refsource": "MISC", "url": "https://bz.apache.org/bugzilla/show_bug.cgi?id=65861" }, { "name": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife", "refsource": "MISC", "url": "https://cwiki.apache.org/confluence/display/HTTPD/ModuleLife" }, { "name": "DSA-5119", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5119" }, { "name": "FEDORA-2022-13cc09ecf2", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJPMCWCGWBN3QWCDVILWQWPC75RR67LT/" }, { "name": "FEDORA-2022-2af658b090", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZ4ARNGLMGYBKYDX2B7DRBNMF6EH3A6R/" }, { "name": "https://support.apple.com/kb/HT213345", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT213345" }, { "name": "20220721 APPLE-SA-2022-07-20-2 macOS Monterey 12.5", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2022/Jul/18" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-24070", "datePublished": "2022-04-12T17:50:14", "dateReserved": "2022-01-27T00:00:00", "dateUpdated": "2024-08-03T03:59:23.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11803 (GCVE-0-2018-11803)
Vulnerability from cvelistv5
Published
2019-02-05 17:00
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Access of Uninitialized Pointer
Summary
Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: Apache Subversion 1.11.0, 1.10.0 to 1.10.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:09.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3869-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3869-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E" }, { "name": "106770", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106770" }, { "name": "GLSA-201904-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201904-08" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "Apache Subversion 1.11.0, 1.10.0 to 1.10.3" } ] } ], "datePublic": "2019-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Subversion\u0027s mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation." } ], "problemTypes": [ { "descriptions": [ { "description": "Access of Uninitialized Pointer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T06:06:04", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "USN-3869-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3869-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003%40%3Cdev.subversion.apache.org%3E" }, { "name": "106770", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106770" }, { "name": "GLSA-201904-08", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201904-08" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2019-01-23T00:00:00", "ID": "CVE-2018-11803", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "Apache Subversion 1.11.0, 1.10.0 to 1.10.3" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Subversion\u0027s mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access of Uninitialized Pointer" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3869-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3869-1/" }, { "name": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E", "refsource": "CONFIRM", "url": "https://lists.apache.org/thread.html/fa71074862373c142d264534385f8ea5d8d6b80d27f36f3c46f55003@%3Cdev.subversion.apache.org%3E" }, { "name": "106770", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106770" }, { "name": "GLSA-201904-08", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201904-08" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2018-11803", "datePublished": "2019-02-05T17:00:00Z", "dateReserved": "2018-06-05T00:00:00", "dateUpdated": "2024-09-17T01:56:52.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-3184 (GCVE-0-2015-3184)
Vulnerability from cvelistv5
Published
2015-08-12 14:00
Modified
2024-08-06 05:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:39:31.648Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "name": "76274", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76274" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "name": "76274", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76274" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-3184", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1742", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "https://support.apple.com/HT206172", "refsource": "CONFIRM", "url": "https://support.apple.com/HT206172" }, { "name": "DSA-3331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3331" }, { "name": "openSUSE-SU-2015:1401", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-08/msg00022.html" }, { "name": "76274", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76274" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "1033215", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033215" }, { "name": "APPLE-SA-2016-03-21-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00003.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-3184-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-3184", "datePublished": "2015-08-12T14:00:00", "dateReserved": "2015-04-10T00:00:00", "dateUpdated": "2024-08-06T05:39:31.648Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0248 (GCVE-0-2015-0248)
Vulnerability from cvelistv5
Published
2015-04-08 18:00
Modified
2024-08-06 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "74260", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74260" }, { "name": "1033214", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-20T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2015:1742", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "74260", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74260" }, { "name": "1033214", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0248", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2015:1742", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html" }, { "name": "DSA-3231", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3231" }, { "name": "RHSA-2015:1633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html" }, { "name": "74260", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74260" }, { "name": "1033214", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033214" }, { "name": "https://support.apple.com/HT205217", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205217" }, { "name": "MDVSA-2015:192", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "APPLE-SA-2015-09-16-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html" }, { "name": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0248", "datePublished": "2015-04-08T18:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-4644 (GCVE-0-2010-4644)
Vulnerability from cvelistv5
Published
2011-01-07 18:00
Modified
2024-08-07 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:51:17.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "name": "ADV-2011-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "name": "subversion-blameg-dos(64473)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473" }, { "name": "42969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42969" }, { "name": "[dev] 20101104 \"svn blame -g\" causing svnserve to hang \u0026 mem usage to hit 2GB", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1032808" }, { "name": "42780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "name": "[oss-security] 20110105 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43346" }, { "name": "43115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43115" }, { "name": "FEDORA-2011-0099", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "name": "ADV-2011-0015", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "name": "[oss-security] 20110102 CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "RHSA-2011:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "name": "[subversion-users] 20101104 svnserve.exe (Win32) using 2GB of memory and then crashing?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E" }, { "name": "MDVSA-2011:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "name": "45655", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45655" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43139" }, { "name": "1024935", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024935" }, { "name": "ADV-2011-0162", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-11-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/8" }, { "name": "ADV-2011-0103", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0103" }, { "name": "subversion-blameg-dos(64473)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64473" }, { "name": "42969", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42969" }, { "name": "[dev] 20101104 \"svn blame -g\" causing svnserve to hang \u0026 mem usage to hit 2GB", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://svn.haxx.se/dev/archive-2010-11/0102.shtml" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1032808" }, { "name": "42780", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES" }, { "name": "[oss-security] 20110105 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/05/4" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43346" }, { "name": "43115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43115" }, { "name": "FEDORA-2011-0099", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html" }, { "name": "ADV-2011-0015", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0015" }, { "name": "[oss-security] 20110102 CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/02/1" }, { "name": "[www-announce] 20101124 Apache Subversion 1.6.15 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "RHSA-2011:0257", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0257.html" }, { "name": "[subversion-users] 20101104 svnserve.exe (Win32) using 2GB of memory and then crashing?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E" }, { "name": "MDVSA-2011:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:006" }, { "name": "[oss-security] 20110104 Re: CVE request for subversion", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/01/04/10" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "name": "45655", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45655" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43139" }, { "name": "1024935", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024935" }, { "name": "ADV-2011-0162", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0162" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4644", "datePublished": "2011-01-07T18:00:00", "dateReserved": "2011-01-03T00:00:00", "dateUpdated": "2024-08-07T03:51:17.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4246 (GCVE-0-2013-4246)
Vulnerability from cvelistv5
Published
2017-10-30 14:00
Modified
2024-08-06 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt" }, { "name": "101620", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101620" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-01T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt" }, { "name": "101620", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101620" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-4246-advisory.txt" }, { "name": "101620", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101620" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4246", "datePublished": "2017-10-30T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1783 (GCVE-0-2011-1783)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.818Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-1783-advisory.txt" }, { "name": "oval:org.mitre.oval:def:18889", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709112" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44888" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45162" }, { "name": "1025618", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025618" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1783", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0203 (GCVE-0-2019-0203)
Vulnerability from cvelistv5
Published
2019-09-26 15:59
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache Subversion |
Version: Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.729Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-26T15:59:02", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-0203", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt", "refsource": "MISC", "url": "http://subversion.apache.org/security/CVE-2019-0203-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-0203", "datePublished": "2019-09-26T15:59:02", "dateReserved": "2018-11-14T00:00:00", "dateUpdated": "2024-08-04T17:44:14.729Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-0202 (GCVE-0-2015-0202)
Vulnerability from cvelistv5
Published
2015-04-08 18:00
Modified
2024-08-06 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:03:10.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "76446", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76446" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "1032100", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032100" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "76446", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76446" }, { "name": "MDVSA-2015:192", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "1032100", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032100" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-0202", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "76446", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76446" }, { "name": "MDVSA-2015:192", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192" }, { "name": "1032100", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032100" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" }, { "name": "openSUSE-SU-2015:0672", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html" }, { "name": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-0202", "datePublished": "2015-04-08T18:00:00", "dateReserved": "2014-11-18T00:00:00", "dateUpdated": "2024-08-06T04:03:10.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1921 (GCVE-0-2011-1921)
Vulnerability from cvelistv5
Published
2011-06-06 19:00
Modified
2024-08-06 22:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:45:59.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44888" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "name": "1025619", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025619" }, { "name": "oval:org.mitre.oval:def:18999", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18999" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45162" }, { "name": "subversion-control-rules-info-disc(67804)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67804" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-2251", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2251" }, { "name": "USN-1144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1144-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5130" }, { "name": "MDVSA-2011:106", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:106" }, { "name": "44849", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44849" }, { "name": "RHSA-2011:0862", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0862.html" }, { "name": "FEDORA-2011-8341", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709114" }, { "name": "44888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44888" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-1921-advisory.txt" }, { "name": "1025619", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025619" }, { "name": "oval:org.mitre.oval:def:18999", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18999" }, { "name": "APPLE-SA-2012-02-01-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" }, { "name": "45162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45162" }, { "name": "subversion-control-rules-info-disc(67804)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67804" }, { "name": "44681", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44681" }, { "name": "48091", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48091" }, { "name": "FEDORA-2011-8352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html" }, { "name": "44633", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1921", "datePublished": "2011-06-06T19:00:00", "dateReserved": "2011-05-09T00:00:00", "dateUpdated": "2024-08-06T22:45:59.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-0032 (GCVE-0-2014-0032)
Vulnerability from cvelistv5
Published
2014-02-14 15:00
Modified
2024-08-06 08:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:58:26.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES" }, { "name": "56822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56822" }, { "name": "61321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61321" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "102927", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/102927" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "[subversion-dev] 20140110 2 Re: Segfault in mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320" }, { "name": "65434", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65434" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6444" }, { "name": "[subversion-dev] 20140110 Sin mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E" }, { "name": "openSUSE-SU-2014:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60722" }, { "name": "[subversion-dev] 20140110 Re: Segfault in mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES" }, { "name": "apache-subversion-cve20140032-dos(90986)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90986" }, { "name": "openSUSE-SU-2014:0334", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the \"svn ls http://svn.example.com\" command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES" }, { "name": "56822", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56822" }, { "name": "61321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61321" }, { "name": "USN-2316-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "102927", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/102927" }, { "name": "RHSA-2014:0255", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "[subversion-dev] 20140110 2 Re: Segfault in mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320" }, { "name": "65434", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65434" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6444" }, { "name": "[subversion-dev] 20140110 Sin mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E" }, { "name": "openSUSE-SU-2014:0307", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html" }, { "name": "60722", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60722" }, { "name": "[subversion-dev] 20140110 Re: Segfault in mod_dav_svn with repositories on /", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES" }, { "name": "apache-subversion-cve20140032-dos(90986)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90986" }, { "name": "openSUSE-SU-2014:0334", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the \"svn ls http://svn.example.com\" command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES", "refsource": "CONFIRM", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES" }, { "name": "56822", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56822" }, { "name": "61321", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61321" }, { "name": "USN-2316-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2316-1" }, { "name": "102927", "refsource": "OSVDB", "url": "http://www.osvdb.org/102927" }, { "name": "RHSA-2014:0255", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0255.html" }, { "name": "[subversion-dev] 20140110 2 Re: Segfault in mod_dav_svn with repositories on /", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502@reser.org%3E" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1557320" }, { "name": "65434", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65434" }, { "name": "http://support.apple.com/kb/HT6444", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6444" }, { "name": "[subversion-dev] 20140110 Sin mod_dav_svn with repositories on /", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA@mail.gmail.com%3E" }, { "name": "openSUSE-SU-2014:0307", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html" }, { "name": "60722", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60722" }, { "name": "[subversion-dev] 20140110 Re: Segfault in mod_dav_svn with repositories on /", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf@ntlworld.com%3E" }, { "name": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES", "refsource": "CONFIRM", "url": "http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES" }, { "name": "apache-subversion-cve20140032-dos(90986)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90986" }, { "name": "openSUSE-SU-2014:0334", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0032", "datePublished": "2014-02-14T15:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T08:58:26.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-7393 (GCVE-0-2013-7393)
Vulnerability from cvelistv5
Published
2014-07-28 19:00
Modified
2024-08-06 18:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3).
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:16.033Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-14T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7393", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2013-4262-advisory.txt" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7393", "datePublished": "2014-07-28T19:00:00", "dateReserved": "2014-07-28T00:00:00", "dateUpdated": "2024-08-06T18:09:16.033Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-46901 (GCVE-0-2024-46901)
Vulnerability from cvelistv5
Published
2024-12-09 09:36
Modified
2025-04-13 21:02
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.
All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.
Repositories served via other access methods are not affected.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 0 ≤ 1.14.4 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46901", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-09T15:23:08.175468Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-09T15:23:24.851Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-04-13T21:02:57.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://lists.debian.org/debian-lts-announce/2025/04/msg00023.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "1.14.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "HaoZi, WordPress China" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\u003cbr\u003e\u003cbr\u003eAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\u003cbr\u003e\u003cbr\u003eRepositories served via other access methods are not affected." } ], "value": "Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository.\n\nAll versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue.\n\nRepositories served via other access methods are not affected." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-09T09:36:52.445Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://subversion.apache.org/security/CVE-2024-46901-advisory.txt" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache Subversion: mod_dav_svn denial-of-service via control characters in paths", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-46901", "datePublished": "2024-12-09T09:36:52.445Z", "dateReserved": "2024-09-13T04:50:02.877Z", "dateUpdated": "2025-04-13T21:02:57.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1849 (GCVE-0-2013-1849)
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130305 Apache Subversion mod_dav_svn DoS via\tMKACTIVITY/PROPFIND", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2013/Mar/56" }, { "name": "oval:org.mitre.oval:def:18980", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18980" }, { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929093" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20130305 Apache Subversion mod_dav_svn DoS via\tMKACTIVITY/PROPFIND", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2013/Mar/56" }, { "name": "oval:org.mitre.oval:def:18980", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18980" }, { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929093" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130305 Apache Subversion mod_dav_svn DoS via\tMKACTIVITY/PROPFIND", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2013/Mar/56" }, { "name": "oval:org.mitre.oval:def:18980", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18980" }, { "name": "openSUSE-SU-2013:0687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929093", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929093" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-1849-advisory.txt" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "openSUSE-SU-2013:0932", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "MDVSA-2013:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1849", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0179 (GCVE-0-2004-0179)
Vulnerability from cvelistv5
Published
2004-04-16 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "10136", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10136" }, { "name": "GLSA-200405-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-04.xml" }, { "name": "RHSA-2004:157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-157.html" }, { "name": "20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213873203477\u0026w=2" }, { "name": "GLSA-200405-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-01.xml" }, { "name": "RHSA-2004:160", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-160.html" }, { "name": "MDKSA-2004:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" }, { "name": "DSA-487", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-487" }, { "name": "oval:org.mitre.oval:def:1065", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065" }, { "name": "oval:org.mitre.oval:def:10913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913" }, { "name": "SuSE-SA:2004:009", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" }, { "name": "20040404-01-U", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" }, { "name": "RHSA-2004:158", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-158.html" }, { "name": "RHSA-2004:159", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-159.html" }, { "name": "20040416 void.at - neon format string bugs", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108214147022626\u0026w=2" }, { "name": "11363", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/11363" }, { "name": "SuSE-SA:2004:008", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" }, { "name": "FEDORA-2004-1552", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" }, { "name": "5365", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/5365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "10136", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10136" }, { "name": "GLSA-200405-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-04.xml" }, { "name": "RHSA-2004:157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-157.html" }, { "name": "20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213873203477\u0026w=2" }, { "name": "GLSA-200405-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-01.xml" }, { "name": "RHSA-2004:160", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-160.html" }, { "name": "MDKSA-2004:032", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" }, { "name": "DSA-487", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-487" }, { "name": "oval:org.mitre.oval:def:1065", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065" }, { "name": "oval:org.mitre.oval:def:10913", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913" }, { "name": "SuSE-SA:2004:009", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" }, { "name": "20040404-01-U", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" }, { "name": "RHSA-2004:158", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-158.html" }, { "name": "RHSA-2004:159", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-159.html" }, { "name": "20040416 void.at - neon format string bugs", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108214147022626\u0026w=2" }, { "name": "11363", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/11363" }, { "name": "SuSE-SA:2004:008", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" }, { "name": "FEDORA-2004-1552", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" }, { "name": "5365", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/5365" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0179", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "10136", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10136" }, { "name": "GLSA-200405-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-04.xml" }, { "name": "RHSA-2004:157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-157.html" }, { "name": "20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108213873203477\u0026w=2" }, { "name": "GLSA-200405-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-01.xml" }, { "name": "RHSA-2004:160", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-160.html" }, { "name": "MDKSA-2004:032", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:032" }, { "name": "DSA-487", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-487" }, { "name": "oval:org.mitre.oval:def:1065", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1065" }, { "name": "oval:org.mitre.oval:def:10913", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10913" }, { "name": "SuSE-SA:2004:009", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0002.html" }, { "name": "20040404-01-U", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc" }, { "name": "RHSA-2004:158", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-158.html" }, { "name": "RHSA-2004:159", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-159.html" }, { "name": "20040416 void.at - neon format string bugs", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108214147022626\u0026w=2" }, { "name": "11363", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/11363" }, { "name": "SuSE-SA:2004:008", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2004-Apr/0003.html" }, { "name": "FEDORA-2004-1552", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=1552" }, { "name": "5365", "refsource": "OSVDB", "url": "http://www.osvdb.org/5365" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0179", "datePublished": "2004-04-16T04:00:00", "dateReserved": "2004-02-25T00:00:00", "dateUpdated": "2024-08-08T00:10:03.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5259 (GCVE-0-2015-5259)
Vulnerability from cvelistv5
Published
2016-01-08 19:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:08.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt" }, { "name": "1034469", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034469" }, { "name": "82300", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/82300" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt" }, { "name": "1034469", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034469" }, { "name": "82300", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/82300" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5259", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-5259-advisory.txt" }, { "name": "1034469", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034469" }, { "name": "82300", "refsource": "BID", "url": "http://www.securityfocus.com/bid/82300" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5259", "datePublished": "2016-01-08T19:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:08.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4277 (GCVE-0-2013-4277)
Vulnerability from cvelistv5
Published
2013-09-16 19:00
Modified
2024-08-06 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "apache-subversion-cve20134277-symlink(86972)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86972" }, { "name": "62266", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62266" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt" }, { "name": "openSUSE-SU-2013:1485", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00054.html" }, { "name": "openSUSE-SU-2013:1442", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00031.html" }, { "name": "oval:org.mitre.oval:def:18554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "apache-subversion-cve20134277-symlink(86972)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86972" }, { "name": "62266", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62266" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt" }, { "name": "openSUSE-SU-2013:1485", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00054.html" }, { "name": "openSUSE-SU-2013:1442", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00031.html" }, { "name": "oval:org.mitre.oval:def:18554", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "apache-subversion-cve20134277-symlink(86972)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86972" }, { "name": "62266", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62266" }, { "name": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-4277-advisory.txt" }, { "name": "openSUSE-SU-2013:1485", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00054.html" }, { "name": "openSUSE-SU-2013:1442", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00031.html" }, { "name": "oval:org.mitre.oval:def:18554", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18554" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4277", "datePublished": "2013-09-16T19:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-2167 (GCVE-0-2016-2167)
Vulnerability from cvelistv5
Published
2016-05-05 18:00
Modified
2024-08-05 23:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:17:50.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2016-20cc04ac50", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "89417", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/89417" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "name": "openSUSE-SU-2016:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "1035706", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035706" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:50", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2016-20cc04ac50", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "89417", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/89417" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E" }, { "name": "openSUSE-SU-2016:1263", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "1035706", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035706" }, { "name": "GLSA-201610-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-05" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-2167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-20cc04ac50", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html" }, { "name": "89417", "refsource": "BID", "url": "http://www.securityfocus.com/bid/89417" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E" }, { "name": "SSA:2016-121-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.417496" }, { "name": "openSUSE-SU-2016:1264", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html" }, { "name": "[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E" }, { "name": "openSUSE-SU-2016:1263", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html" }, { "name": "DSA-3561", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3561" }, { "name": "1035706", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035706" }, { "name": "GLSA-201610-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-05" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2016-2167-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-2167", "datePublished": "2016-05-05T18:00:00", "dateReserved": "2016-01-29T00:00:00", "dateUpdated": "2024-08-05T23:17:50.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-3315 (GCVE-0-2010-3315)
Vulnerability from cvelistv5
Published
2010-10-04 20:00
Modified
2024-08-07 03:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:03:18.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:19007", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007" }, { "name": "41652", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41652" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2010-3315-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-3315" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "DSA-2118", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2118" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43346" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "MDVSA-2010:199", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:199" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43139" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "oval:org.mitre.oval:def:19007", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007" }, { "name": "41652", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41652" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2010-3315-advisory.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://security-tracker.debian.org/tracker/CVE-2010-3315" }, { "name": "ADV-2011-0264", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0264" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "DSA-2118", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2118" }, { "name": "43346", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43346" }, { "name": "RHSA-2011:0258", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0258.html" }, { "name": "USN-1053-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1053-1" }, { "name": "SUSE-SR:2010:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "name": "MDVSA-2010:199", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:199" }, { "name": "43139", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43139" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4581" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3315", "datePublished": "2010-10-04T20:00:00", "dateReserved": "2010-09-13T00:00:00", "dateUpdated": "2024-08-07T03:03:18.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0715 (GCVE-0-2011-0715)
Vulnerability from cvelistv5
Published
2011-03-11 22:00
Modified
2024-08-06 22:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:05:52.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1025161", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025161" }, { "name": "MDVSA-2011:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "USN-1096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "ADV-2011-0567", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "43583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43583" }, { "name": "46734", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46734" }, { "name": "FEDORA-2011-2657", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "oval:org.mitre.oval:def:18967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "name": "ADV-2011-0568", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSA:2011-070-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "DSA-2181", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "RHSA-2011:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "ADV-2011-0776", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "ADV-2011-0660", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "FEDORA-2011-2698", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "FEDORA-2011-3775", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "RHSA-2011:0328", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "ADV-2011-0684", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "subversion-moddavsvn-dos(65876)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "name": "[dev] 20110303 Subversion 1.6.16 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "43794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43794" }, { "name": "ADV-2011-0885", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "ADV-2011-0624", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "43603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43603" }, { "name": "43672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43672" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "70964", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/70964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1025161", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025161" }, { "name": "MDVSA-2011:067", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:067" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "USN-1096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1096-1" }, { "name": "ADV-2011-0567", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0567" }, { "name": "43583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43583" }, { "name": "46734", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46734" }, { "name": "FEDORA-2011-2657", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html" }, { "name": "oval:org.mitre.oval:def:18967", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967" }, { "name": "ADV-2011-0568", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0568" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "SSA:2011-070-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.479953" }, { "name": "DSA-2181", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2181" }, { "name": "RHSA-2011:0327", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0327.html" }, { "name": "SUSE-SR:2011:005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" }, { "name": "ADV-2011-0776", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0776" }, { "name": "ADV-2011-0660", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0660" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES" }, { "name": "FEDORA-2011-2698", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html" }, { "name": "FEDORA-2011-3775", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2011-0715-advisory.txt" }, { "name": "RHSA-2011:0328", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2011-0328.html" }, { "name": "ADV-2011-0684", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0684" }, { "name": "subversion-moddavsvn-dos(65876)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680755" }, { "name": "[dev] 20110303 Subversion 1.6.16 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://svn.haxx.se/dev/archive-2011-03/0122.shtml" }, { "name": "43794", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43794" }, { "name": "ADV-2011-0885", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0885" }, { "name": "ADV-2011-0624", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0624" }, { "name": "43603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43603" }, { "name": "43672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43672" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071239" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1071307" }, { "name": "70964", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/70964" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0715", "datePublished": "2011-03-11T22:00:00", "dateReserved": "2011-01-31T00:00:00", "dateUpdated": "2024-08-06T22:05:52.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8734 (GCVE-0-2016-8734)
Vulnerability from cvelistv5
Published
2017-10-16 13:00
Modified
2024-09-16 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Subversion |
Version: 1.4.0 to 1.8.16 Version: 1.9.0 to 1.9.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:41.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "name": "1037361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.4.0 to 1.8.16" }, { "status": "affected", "version": "1.9.0 to 1.9.4" } ] } ], "datePublic": "2017-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "94588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "name": "1037361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-10-13T00:00:00", "ID": "CVE-2016-8734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "1.4.0 to 1.8.16" }, { "version_value": "1.9.0 to 1.9.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "94588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09@%3Cannounce.apache.org%3E" }, { "name": "1037361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3932" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-8734", "datePublished": "2017-10-16T13:00:00Z", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-09-16T20:01:52.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1846 (GCVE-0-2013-1846)
Vulnerability from cvelistv5
Published
2013-05-02 14:00
Modified
2024-08-06 15:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929087" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18087", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18087" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2013:0687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929087" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18087", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18087" }, { "name": "openSUSE-SU-2013:0932", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt" }, { "name": "MDVSA-2013:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1846", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2013:0687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00095.html" }, { "name": "RHSA-2013:0737", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0737.html" }, { "name": "[subversion-announce] 20130404 Subversion 1.6.21 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvSTMLbn4q_KM3Ph2UOeSiPGhEK4%3DSvwEjaHW_GUGkYWPQ%40mail.gmail.com%3E" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=929087", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=929087" }, { "name": "[subversion-announce] 20130404 Apache Subversion 1.7.9 released", "refsource": "MLIST", "url": "http://mail-archives.apache.org/mod_mbox/subversion-announce/201304.mbox/%3CCADkdwvRoyVrZV12tgC0FMGrc6%2BMisd3qTcZ%2BDdpFGgTahkgAkQ%40mail.gmail.com%3E" }, { "name": "USN-1893-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1893-1" }, { "name": "oval:org.mitre.oval:def:18087", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18087" }, { "name": "openSUSE-SU-2013:0932", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00069.html" }, { "name": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2013-1846-advisory.txt" }, { "name": "MDVSA-2013:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:153" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1846", "datePublished": "2013-05-02T14:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8108 (GCVE-0-2014-8108)
Vulnerability from cvelistv5
Published
2014-12-18 15:00
Modified
2024-08-06 13:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:10:50.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT204427" }, { "name": "71725", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71725" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "61131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt" }, { "name": "RHSA-2015:0166", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT204427" }, { "name": "71725", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71725" }, { "name": "APPLE-SA-2015-03-09-4", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "61131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2721-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-8108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2014-8108-advisory.txt" }, { "name": "RHSA-2015:0166", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0166.html" }, { "name": "https://support.apple.com/HT204427", "refsource": "CONFIRM", "url": "https://support.apple.com/HT204427" }, { "name": "71725", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71725" }, { "name": "APPLE-SA-2015-03-09-4", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html" }, { "name": "61131", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61131" }, { "name": "USN-2721-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2721-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-8108", "datePublished": "2014-12-18T15:00:00", "dateReserved": "2014-10-10T00:00:00", "dateUpdated": "2024-08-06T13:10:50.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-5343 (GCVE-0-2015-5343)
Vulnerability from cvelistv5
Published
2016-04-14 14:00
Modified
2024-08-06 06:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:41:09.538Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3424", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3424" }, { "name": "1034470", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034470" }, { "name": "SSA:2016-097-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.405261" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-30T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-3424", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3424" }, { "name": "1034470", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034470" }, { "name": "SSA:2016-097-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.405261" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-5343", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3424", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3424" }, { "name": "1034470", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034470" }, { "name": "SSA:2016-097-01", "refsource": "SLACKWARE", "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.405261" }, { "name": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt", "refsource": "CONFIRM", "url": "http://subversion.apache.org/security/CVE-2015-5343-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-5343", "datePublished": "2016-04-14T14:00:00", "dateReserved": "2015-07-01T00:00:00", "dateUpdated": "2024-08-06T06:41:09.538Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11782 (GCVE-0-2018-11782)
Vulnerability from cvelistv5
Published
2019-09-26 15:55
Modified
2024-08-05 08:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Apache Subversion |
Version: Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:17:09.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-26T15:55:30", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2018-11782", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt", "refsource": "MISC", "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2018-11782", "datePublished": "2019-09-26T15:55:30", "dateReserved": "2018-06-05T00:00:00", "dateUpdated": "2024-08-05T08:17:09.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }