VuXML ID | Description |
8e887b71-d769-11e4-b1c2-20cf30e32f6d | subversion -- DoS vulnerabilities
Subversion Project reports:
Subversion HTTP servers with FSFS repositories are vulnerable to a remotely
triggerable excessive memory use with certain REPORT requests.
Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable
assertion DoS vulnerability for certain requests with dynamically evaluated
revision numbers.
Subversion HTTP servers allow spoofing svn:author property values for new
revisions.
Discovery 2015-03-31 Entry 2015-03-31 mod_dav_svn
ge 1.5.0 lt 1.7.20
ge 1.8.0 lt 1.8.13
subversion16
ge 1.0.0 lt 1.7.20
subversion17
ge 1.0.0 lt 1.7.20
subversion
ge 1.0.0 lt 1.7.20
ge 1.8.0 lt 1.8.13
http://subversion.apache.org/security/
CVE-2015-0202
CVE-2015-0248
CVE-2015-0251
http://subversion.apache.org/security/CVE-2015-0202-advisory.txt
http://subversion.apache.org/security/CVE-2015-0248-advisory.txt
http://subversion.apache.org/security/CVE-2015-0251-advisory.txt
|
ac256985-b6a9-11e6-a3bf-206a8a720317 | subversion -- Unrestricted XML entity expansion in mod_dontdothat and Subversionclients using http(s)
The Apache Software Foundation reports:
The mod_dontdothat module of subversion and subversion clients using
http(s):// are vulnerable to a denial-of-service attack, caused by
exponential XML entity expansion. The attack targets XML parsers
causing targeted process to consume excessive amounts of resources.
The attack is also known as the "billions of laughs attack."
Discovery 2016-11-29 Entry 2016-11-29 subversion18
< 1.8.17
subversion
< 1.9.5
http://subversion.apache.org/security/CVE-2016-8734-advisory.txt
CVE-2016-8734
|
83a418cc-2182-11e4-802c-20cf30e32f6d | subversion -- several vulnerabilities
Subversion Project reports:
Using the Serf RA layer of Subversion for HTTPS uses the apr_fnmatch API
to handle matching wildcards in certificate Common Names and Subject
Alternate Names. However, apr_fnmatch is not designed for this purpose.
Instead it is designed to behave like common shell globbing. In particular
this means that '*' is not limited to a single label within a hostname
(i.e. it will match '.'). But even further apr_fnmatch supports '?' and
character classes (neither of which are part of the RFCs defining how
certificate validation works).
Subversion stores cached credentials by an MD5 hash based on the URL and
the authentication realm of the server the credentials are cached for.
MD5 has been shown to be subject to chosen plaintext hash collisions.
This means it may be possible to generate an authentication realm which
results in the same MD5 hash for a different URL.
Discovery 2014-08-06 Entry 2014-08-11 subversion16
ge 1.0.0 lt 1.7.18
subversion17
ge 1.0.0 lt 1.7.18
subversion
ge 1.0.0 lt 1.7.18
ge 1.8.0 lt 1.8.10
CVE-2014-3522
CVE-2014-3528
http://subversion.apache.org/security/CVE-2014-3522-advisory.txt
http://subversion.apache.org/security/CVE-2014-3528-advisory.txt
|
c8174b63-0d3a-11e6-b06e-d43d7eed0ce2 | subversion -- multiple vulnerabilities
Subversion project reports:
svnserve, the svn:// protocol server, can optionally use the Cyrus
SASL library for authentication, integrity protection, and encryption.
Due to a programming oversight, authentication against Cyrus SASL
would permit the remote user to specify a realm string which is
a prefix of the expected realm string.
Subversion's httpd servers are vulnerable to a remotely triggerable crash
in the mod_authz_svn module. The crash can occur during an authorization
check for a COPY or MOVE request with a specially crafted header value.
This allows remote attackers to cause a denial of service.
Discovery 2016-04-21 Entry 2016-04-28 subversion
ge 1.9.0 lt 1.9.4
ge 1.0.0 lt 1.8.15
subversion18
ge 1.0.0 lt 1.8.15
CVE-2016-2167
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
CVE-2016-2168
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
|
e27a1af3-8d21-11e0-a45d-001e8c75030d | Subversion -- multiple vulnerabilities
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will
dereference a NULL pointer if asked to deliver baselined WebDAV
resources.
This can lead to a DoS. An exploit has been tested, and tools
or users have been observed triggering this problem in the
wild.
Subversion's mod_dav_svn Apache HTTPD server module may in
certain scenarios enter a logic loop which does not exit and
which allocates memory in each iteration, ultimately exhausting
all the available memory on the server.
This can lead to a DoS. There are no known instances of this
problem being observed in the wild, but an exploit has been
tested.
Subversion's mod_dav_svn Apache HTTPD server module may leak to
remote users the file contents of files configured to be
unreadable by those users.
There are no known instances of this problem being observed in
the wild, but an exploit has been tested.
Discovery 2011-05-28 Entry 2011-06-02 subversion
< 1.6.17
subversion-freebsd
< 1.6.17
CVE-2011-1752
CVE-2011-1783
CVE-2011-1921
|
bce1f76d-82d0-11de-88ea-001a4d49522b | subversion -- heap overflow vulnerability
A Subversion Security Advisory reports:
Subversion clients and servers have multiple heap
overflow issues in the parsing of binary deltas. This is
related to an allocation vulnerability in the APR library
used by Subversion.
Clients with commit access to a vulnerable server can
cause a remote heap overflow; servers can cause a heap
overflow on vulnerable clients that try to do a checkout
or update.
This can lead to a DoS (an exploit has been tested) and
to arbitrary code execution (no exploit tested, but the
possibility is clear).
Discovery 2009-08-06 Entry 2009-08-06 Modified 2009-08-07 subversion
subversion-freebsd
p5-subversion
py-subversion
< 1.6.4
CVE-2009-2411
http://subversion.tigris.org/security/CVE-2009-2411-advisory.txt
|
71612099-1e93-11e0-a587-001b77d09812 | subversion -- multiple DoS
Entry for CVE-2010-4539 says:
The walk function in repos.c in the mod_dav_svn module
for the Apache HTTP Server, as distributed in Apache
Subversion before 1.6.15, allows remote authenticated
users to cause a denial of service (NULL pointer
dereference and daemon crash) via vectors that trigger
the walking of SVNParentPath collections.
Entry for CVE-2010-4644 says:
Multiple memory leaks in rev_hunt.c in Apache Subversion
before 1.6.15 allow remote authenticated users to cause
a denial of service (memory consumption and daemon crash)
via the -g option to the blame command.
Discovery 2011-01-02 Entry 2011-01-13 subversion
< 1.6.15
subversion-freebsd
< 1.6.15
45655
CVE-2010-4539
CVE-2010-4644
|
f5561ade-846c-11e4-b7a7-20cf30e32f6d | subversion -- DoS vulnerabilities
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will crash when it
receives a REPORT request for some invalid formatted special URIs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when it
receives a request for some invalid formatted special URIs.
We consider this to be a medium risk vulnerability. Repositories which
allow for anonymous reads will be vulnerable without authentication.
Unfortunately, no special configuration is required and all mod_dav_svn
servers are vulnerable.
Discovery 2014-12-13 Entry 2014-12-15 mod_dav_svn
ge 1.8.0 lt 1.8.11
subversion16
ge 1.0.0 lt 1.7.19
subversion17
ge 1.0.0 lt 1.7.19
subversion
ge 1.0.0 lt 1.7.19
ge 1.8.0 lt 1.8.11
CVE-2014-3580
CVE-2014-8108
http://subversion.apache.org/security/CVE-2014-3580-advisory.txt
http://subversion.apache.org/security/CVE-2014-8108-advisory.txt
|
b6beb137-9dc0-11e2-882f-20cf30e32f6d | Subversion -- multiple vulnerabilities
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will use excessive
amounts of memory when a large number of properties are set or deleted
on a node.
Subversion's mod_dav_svn Apache HTTPD server module will crash when
a LOCK request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash in some
circumstances when a LOCK request is made against a non-existent URL.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a
PROPFIND request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a
log REPORT request receives a limit that is out of the allowed range.
Discovery 2013-04-05 Entry 2013-04-05 subversion
ge 1.7.0 lt 1.7.9
ge 1.0.0 lt 1.6.21
CVE-2013-1845
CVE-2013-1846
CVE-2013-1847
CVE-2013-1849
CVE-2013-1884
|
184f5d0b-0fe8-11d9-8a8a-000c41e2cdad | subversion -- WebDAV fails to protect metadata
In some situations, subversion metadata may be unexpectedly
disclosed via WebDAV. A subversion advisory states:
mod_authz_svn, the Apache httpd module which does path-based
authorization on Subversion repositories, is not correctly
protecting all metadata on unreadable paths.
This security issue is not about revealing the contents
of protected files: it only reveals metadata about
protected areas such as paths and log messages. This may
or may not be important to your organization, depending
on how you're using path-based authorization, and the
sensitivity of the metadata.
Discovery 2004-09-15 Entry 2004-09-26 subversion
subversion-perl
subversion-python
< 1.0.8
CVE-2004-0749
http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt
|
ce502902-ca39-11e2-9673-001e8c75030d | devel/subversion -- svnserve remotely triggerable DoS
Subversion team reports:
Subversion's svnserve server process may exit when an incoming TCP connection
is closed early in the connection process.
Discovery 2013-05-31 Entry 2013-05-31 subversion
ge 1.7.0 lt 1.7.10
ge 1.0.0 lt 1.6.23
CVE-2013-2112
|