VuXML ID | Description |
71612099-1e93-11e0-a587-001b77d09812 | subversion -- multiple DoS
Entry for CVE-2010-4539 says:
The walk function in repos.c in the mod_dav_svn module
for the Apache HTTP Server, as distributed in Apache
Subversion before 1.6.15, allows remote authenticated
users to cause a denial of service (NULL pointer
dereference and daemon crash) via vectors that trigger
the walking of SVNParentPath collections.
Entry for CVE-2010-4644 says:
Multiple memory leaks in rev_hunt.c in Apache Subversion
before 1.6.15 allow remote authenticated users to cause
a denial of service (memory consumption and daemon crash)
via the -g option to the blame command.
Discovery 2011-01-02 Entry 2011-01-13 subversion
< 1.6.15
subversion-freebsd
< 1.6.15
45655
CVE-2010-4539
CVE-2010-4644
|
ac256985-b6a9-11e6-a3bf-206a8a720317 | subversion -- Unrestricted XML entity expansion in mod_dontdothat and Subversionclients using http(s)
The Apache Software Foundation reports:
The mod_dontdothat module of subversion and subversion clients using
http(s):// are vulnerable to a denial-of-service attack, caused by
exponential XML entity expansion. The attack targets XML parsers
causing targeted process to consume excessive amounts of resources.
The attack is also known as the "billions of laughs attack."
Discovery 2016-11-29 Entry 2016-11-29 subversion18
< 1.8.17
subversion
< 1.9.5
http://subversion.apache.org/security/CVE-2016-8734-advisory.txt
CVE-2016-8734
|
e27ca763-4721-11e0-bdc4-001e8c75030d | subversion -- remote HTTP DoS vulnerability
Subversion project reports:
Subversion HTTP servers up to 1.5.9 (inclusive) or 1.6.15 (inclusive)
are vulnerable to a remotely triggerable NULL-pointer dereference.
Discovery 2011-02-27 Entry 2011-03-05 subversion
ge 1.6 le 1.6.15
ge 1.5 le 1.6.9
subversion-freebsd
ge 1.6 le 1.6.15
ge 1.5 le 1.6.9
CVE-2011-0715
|
8e887b71-d769-11e4-b1c2-20cf30e32f6d | subversion -- DoS vulnerabilities
Subversion Project reports:
Subversion HTTP servers with FSFS repositories are vulnerable to a remotely
triggerable excessive memory use with certain REPORT requests.
Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable
assertion DoS vulnerability for certain requests with dynamically evaluated
revision numbers.
Subversion HTTP servers allow spoofing svn:author property values for new
revisions.
Discovery 2015-03-31 Entry 2015-03-31 mod_dav_svn
ge 1.5.0 lt 1.7.20
ge 1.8.0 lt 1.8.13
subversion16
ge 1.0.0 lt 1.7.20
subversion17
ge 1.0.0 lt 1.7.20
subversion
ge 1.0.0 lt 1.7.20
ge 1.8.0 lt 1.8.13
http://subversion.apache.org/security/
CVE-2015-0202
CVE-2015-0248
CVE-2015-0251
http://subversion.apache.org/security/CVE-2015-0202-advisory.txt
http://subversion.apache.org/security/CVE-2015-0248-advisory.txt
http://subversion.apache.org/security/CVE-2015-0251-advisory.txt
|
83a418cc-2182-11e4-802c-20cf30e32f6d | subversion -- several vulnerabilities
Subversion Project reports:
Using the Serf RA layer of Subversion for HTTPS uses the apr_fnmatch API
to handle matching wildcards in certificate Common Names and Subject
Alternate Names. However, apr_fnmatch is not designed for this purpose.
Instead it is designed to behave like common shell globbing. In particular
this means that '*' is not limited to a single label within a hostname
(i.e. it will match '.'). But even further apr_fnmatch supports '?' and
character classes (neither of which are part of the RFCs defining how
certificate validation works).
Subversion stores cached credentials by an MD5 hash based on the URL and
the authentication realm of the server the credentials are cached for.
MD5 has been shown to be subject to chosen plaintext hash collisions.
This means it may be possible to generate an authentication realm which
results in the same MD5 hash for a different URL.
Discovery 2014-08-06 Entry 2014-08-11 subversion16
ge 1.0.0 lt 1.7.18
subversion17
ge 1.0.0 lt 1.7.18
subversion
ge 1.0.0 lt 1.7.18
ge 1.8.0 lt 1.8.10
CVE-2014-3522
CVE-2014-3528
http://subversion.apache.org/security/CVE-2014-3522-advisory.txt
http://subversion.apache.org/security/CVE-2014-3528-advisory.txt
|
b6beb137-9dc0-11e2-882f-20cf30e32f6d | Subversion -- multiple vulnerabilities
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will use excessive
amounts of memory when a large number of properties are set or deleted
on a node.
Subversion's mod_dav_svn Apache HTTPD server module will crash when
a LOCK request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash in some
circumstances when a LOCK request is made against a non-existent URL.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a
PROPFIND request is made against activity URLs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when a
log REPORT request receives a limit that is out of the allowed range.
Discovery 2013-04-05 Entry 2013-04-05 subversion
ge 1.7.0 lt 1.7.9
ge 1.0.0 lt 1.6.21
CVE-2013-1845
CVE-2013-1846
CVE-2013-1847
CVE-2013-1849
CVE-2013-1884
|
e3244a7b-5603-11e3-878d-20cf30e32f6d | subversion -- multiple vulnerabilities
Subversion Project reports:
mod_dontdothat does not restrict requests from serf based clients
mod_dontdothat allows you to block update REPORT requests against certain
paths in the repository. It expects the paths in the REPORT request
to be absolute URLs. Serf based clients send relative URLs instead
of absolute URLs in many cases. As a result these clients are not blocked
as configured by mod_dontdothat.
mod_dav_svn assertion triggered by non-canonical URLs in autoversioning commits
When SVNAutoversioning is enabled via SVNAutoversioning on
commits can be made by single HTTP requests such as MKCOL and
PUT. If Subversion is built with assertions enabled any such
requests that have non-canonical URLs, such as URLs with a
trailing /, may trigger an assert. An assert will cause the
Apache process to abort.
Discovery 2013-11-15 Entry 2013-11-25 subversion
ge 1.4.0 lt 1.7.14
ge 1.8.0 lt 1.8.5
CVE-2013-4505
CVE-2013-4558
http://subversion.apache.org/security/CVE-2013-4505-advisory.txt
http://subversion.apache.org/security/CVE-2013-4558-advisory.txt
|
1839f78c-9f2b-11e3-980f-20cf30e32f6d | subversion -- mod_dav_svn vulnerability
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will crash when it
receives an OPTIONS request against the server root and Subversion is
configured to handle the server root and SVNListParentPath is on.
This can lead to a DoS. There are no known instances of this
problem being exploited in the wild, but the details of how to exploit
it have been disclosed on the Subversion development mailing list.
Discovery 2014-01-10 Entry 2014-02-26 Modified 2014-04-30 subversion
ge 1.3.0 lt 1.7.16
ge 1.8.0 lt 1.8.8
subversion16
ge 1.3.0 lt 1.7.16
subversion17
ge 1.3.0 lt 1.7.16
CVE-2014-0032
https://subversion.apache.org/security/CVE-2014-0032-advisory.txt
|
e27a1af3-8d21-11e0-a45d-001e8c75030d | Subversion -- multiple vulnerabilities
Subversion team reports:
Subversion's mod_dav_svn Apache HTTPD server module will
dereference a NULL pointer if asked to deliver baselined WebDAV
resources.
This can lead to a DoS. An exploit has been tested, and tools
or users have been observed triggering this problem in the
wild.
Subversion's mod_dav_svn Apache HTTPD server module may in
certain scenarios enter a logic loop which does not exit and
which allocates memory in each iteration, ultimately exhausting
all the available memory on the server.
This can lead to a DoS. There are no known instances of this
problem being observed in the wild, but an exploit has been
tested.
Subversion's mod_dav_svn Apache HTTPD server module may leak to
remote users the file contents of files configured to be
unreadable by those users.
There are no known instances of this problem being observed in
the wild, but an exploit has been tested.
Discovery 2011-05-28 Entry 2011-06-02 subversion
< 1.6.17
subversion-freebsd
< 1.6.17
CVE-2011-1752
CVE-2011-1783
CVE-2011-1921
|
f5561ade-846c-11e4-b7a7-20cf30e32f6d | subversion -- DoS vulnerabilities
Subversion Project reports:
Subversion's mod_dav_svn Apache HTTPD server module will crash when it
receives a REPORT request for some invalid formatted special URIs.
Subversion's mod_dav_svn Apache HTTPD server module will crash when it
receives a request for some invalid formatted special URIs.
We consider this to be a medium risk vulnerability. Repositories which
allow for anonymous reads will be vulnerable without authentication.
Unfortunately, no special configuration is required and all mod_dav_svn
servers are vulnerable.
Discovery 2014-12-13 Entry 2014-12-15 mod_dav_svn
ge 1.8.0 lt 1.8.11
subversion16
ge 1.0.0 lt 1.7.19
subversion17
ge 1.0.0 lt 1.7.19
subversion
ge 1.0.0 lt 1.7.19
ge 1.8.0 lt 1.8.11
CVE-2014-3580
CVE-2014-8108
http://subversion.apache.org/security/CVE-2014-3580-advisory.txt
http://subversion.apache.org/security/CVE-2014-8108-advisory.txt
|
e27ca763-4721-11e0-bdc4-001e8c75030d | subversion -- remote HTTP DoS vulnerability
Subversion project reports:
Subversion HTTP servers up to 1.5.9 (inclusive) or 1.6.15 (inclusive)
are vulnerable to a remotely triggerable NULL-pointer dereference.
Discovery 2011-02-27 Entry 2011-03-05 subversion
ge 1.6 le 1.6.15
ge 1.5 le 1.6.9
subversion-freebsd
ge 1.6 le 1.6.15
ge 1.5 le 1.6.9
CVE-2011-0715
|
c8174b63-0d3a-11e6-b06e-d43d7eed0ce2 | subversion -- multiple vulnerabilities
Subversion project reports:
svnserve, the svn:// protocol server, can optionally use the Cyrus
SASL library for authentication, integrity protection, and encryption.
Due to a programming oversight, authentication against Cyrus SASL
would permit the remote user to specify a realm string which is
a prefix of the expected realm string.
Subversion's httpd servers are vulnerable to a remotely triggerable crash
in the mod_authz_svn module. The crash can occur during an authorization
check for a COPY or MOVE request with a specially crafted header value.
This allows remote attackers to cause a denial of service.
Discovery 2016-04-21 Entry 2016-04-28 subversion
ge 1.9.0 lt 1.9.4
ge 1.0.0 lt 1.8.15
subversion18
ge 1.0.0 lt 1.8.15
CVE-2016-2167
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
CVE-2016-2168
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
|
787d21b9-ca38-11e2-9673-001e8c75030d | devel/subversion -- fsfs repositories can be corrupted by newline characters in filenames
Subversion team reports:
If a filename which contains a newline character (ASCII 0x0a) is
committed to a repository using the FSFS format, the resulting
revision is corrupt.
Discovery 2013-05-31 Entry 2013-05-31 subversion
ge 1.7.0 lt 1.7.10
ge 1.1.0 lt 1.6.23
CVE-2013-1968
|
f8a913cc-1322-11e3-8ffa-20cf30e32f6d | svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack.
Subversion Project reports:
svnserve takes a --pid-file option which creates a file containing the
process id it is running as. It does not take steps to ensure that the file
it has been directed at is not a symlink. If the pid file is in a directory
writeable by unprivileged users, the destination could be replaced by a
symlink allowing for privilege escalation. svnserve does not create a pid
file by default.
All versions are only vulnerable when the --pid-file=ARG option is used.
Discovery 2013-08-30 Entry 2013-09-02 subversion
ge 1.4.0 lt 1.6.23_2
ge 1.7.0 lt 1.7.13
ge 1.8.0 lt 1.8.3
CVE-2013-4277
http://subversion.apache.org/security/CVE-2013-4277-advisory.txt
|
ce502902-ca39-11e2-9673-001e8c75030d | devel/subversion -- svnserve remotely triggerable DoS
Subversion team reports:
Subversion's svnserve server process may exit when an incoming TCP connection
is closed early in the connection process.
Discovery 2013-05-31 Entry 2013-05-31 subversion
ge 1.7.0 lt 1.7.10
ge 1.0.0 lt 1.6.23
CVE-2013-2112
|
6d0bf320-ca39-11e2-9673-001e8c75030d | devel/subversion -- contrib hook-scripts can allow arbitrary code execution
Subversion team reports:
The script contrib/hook-scripts/check-mime-type.pl does not escape
argv arguments to 'svnlook' that start with a hyphen. This could be
used to cause 'svnlook', and hence check-mime-type.pl, to error out.
The script contrib/hook-scripts/svn-keyword-check.pl parses filenames
from the output of 'svnlook changed' and passes them to a further
shell command (equivalent to the 'system()' call of the C standard
library) without escaping them. This could be used to run arbitrary
shell commands in the context of the user whom the pre-commit script
runs as (the user who owns the repository).
Discovery 2013-05-31 Entry 2013-05-31 subversion
ge 1.7.0 lt 1.7.10
ge 1.2.0 lt 1.6.23
CVE-2013-2088
|