Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2014-0032
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://secunia.com/advisories/56822
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://www.securityfocus.com/bid/65434
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://www.osvdb.org/102927
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html
- http://rhn.redhat.com/errata/RHSA-2014-0255.html
- http://www.ubuntu.com/usn/USN-2316-1
- http://secunia.com/advisories/60722
- http://support.apple.com/kb/HT6444
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://secunia.com/advisories/61321
- https://security.gentoo.org/glsa/201610-05
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90986
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLAB
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40