[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99536

 
 

909

 
 

80128

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Intended access restriction bypass vulnerability in Apache Subversion via a realm string that is a prefix of an expected repository realm string

ID: oval:org.secpod.oval:def:34613Date: (C)2016-05-24   (M)2017-12-06
Class: VULNERABILITYFamily: windows




The host is installed with Apache Subversion 1.5.x before 1.8.15 and is prone to an intended access restriction bypass vulnerability. A flaw is present in the application, which fails to handle a realm string that is a prefix of an expected repository realm string. Successful exploitation could allow remote attackers to authenticate and bypass intended access restrictions.

Platform:
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2016
Microsoft Windows Server 2008 R2
Product:
Apache Subversion
Reference:
CVE-2016-2167
CVE    1
CVE-2016-2167
CPE    6
cpe:/a:apache:subversion:::x86
cpe:/a:apache:subversion:1.8.15
cpe:/a:apache:subversion:1.9.0
cpe:/a:apache:subversion:1.9.1
...

© 2013 SecPod Technologies