[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-676 ---- mod_dav_svn subversion mod24_dav_svn

ID: oval:org.secpod.oval:def:1600359Date: (C)2016-05-19   (M)2022-09-22
Class: PATCHFamily: unix




It was found that when an SVN server searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable . An integer overflow was discovered allowing remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read. It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. It was found that the mod_dav_svn module was vulnerable to a remotely triggerable heap-based buffer overflow and out-of-bounds read caused by an integer overflow when parsing skel-encoded request bodies, allowing an attacker with write access to a repository to cause a denial of service attack or possibly execute arbitrary code under the context of the httpd process

Platform:
Amazon Linux AMI
Product:
mod_dav_svn
subversion
mod24_dav_svn
Reference:
ALAS-2016-676
CVE-2015-3187
CVE-2015-5259
CVE-2015-3184
CVE-2015-5343
CVE    4
CVE-2015-3187
CVE-2015-3184
CVE-2015-5259
CVE-2015-5343
...
CPE    43
cpe:/a:apache:subversion:1.8.13
cpe:/o:amazon:linux
cpe:/a:apache:subversion:1.8.12
cpe:/a:apache:mod_dav_svn
...

© SecPod Technologies