ID CVE-2013-1846
Summary The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
References
Vulnerable Configurations
  • Apache Software Foundation Subversion 1.6.0
    cpe:2.3:a:apache:subversion:1.6.0
  • Apache Software Foundation Subversion 1.6.1
    cpe:2.3:a:apache:subversion:1.6.1
  • Apache Software Foundation Subversion 1.6.2
    cpe:2.3:a:apache:subversion:1.6.2
  • Apache Software Foundation Subversion 1.6.3
    cpe:2.3:a:apache:subversion:1.6.3
  • Apache Software Foundation Subversion 1.6.4
    cpe:2.3:a:apache:subversion:1.6.4
  • Apache Software Foundation Subversion 1.6.5
    cpe:2.3:a:apache:subversion:1.6.5
  • Apache Software Foundation Subversion 1.6.6
    cpe:2.3:a:apache:subversion:1.6.6
  • Apache Software Foundation Subversion 1.6.7
    cpe:2.3:a:apache:subversion:1.6.7
  • Apache Software Foundation Subversion 1.6.8
    cpe:2.3:a:apache:subversion:1.6.8
  • Apache Software Foundation Subversion 1.6.9
    cpe:2.3:a:apache:subversion:1.6.9
  • Apache Software Foundation Subversion 1.6.10
    cpe:2.3:a:apache:subversion:1.6.10
  • Apache Software Foundation Subversion 1.6.11
    cpe:2.3:a:apache:subversion:1.6.11
  • Apache Software Foundation Subversion 1.6.12
    cpe:2.3:a:apache:subversion:1.6.12
  • Apache Software Foundation Subversion 1.6.13
    cpe:2.3:a:apache:subversion:1.6.13
  • Apache Software Foundation Subversion 1.6.14
    cpe:2.3:a:apache:subversion:1.6.14
  • Apache Software Foundation Subversion 1.6.15
    cpe:2.3:a:apache:subversion:1.6.15
  • Apache Software Foundation Subversion 1.6.16
    cpe:2.3:a:apache:subversion:1.6.16
  • Apache Software Foundation Subversion 1.6.17
    cpe:2.3:a:apache:subversion:1.6.17
  • Apache Software Foundation Subversion 1.6.18
    cpe:2.3:a:apache:subversion:1.6.18
  • Apache Software Foundation Subversion 1.6.19
    cpe:2.3:a:apache:subversion:1.6.19
  • Apache Software Foundation Subversion 1.6.20
    cpe:2.3:a:apache:subversion:1.6.20
  • Apache Software Foundation Subversion 1.7.0
    cpe:2.3:a:apache:subversion:1.7.0
  • Apache Software Foundation Subversion 1.7.1
    cpe:2.3:a:apache:subversion:1.7.1
  • Apache Software Foundation Subversion 1.7.2
    cpe:2.3:a:apache:subversion:1.7.2
  • Apache Software Foundation Subversion 1.7.3
    cpe:2.3:a:apache:subversion:1.7.3
  • Apache Software Foundation Subversion 1.7.4
    cpe:2.3:a:apache:subversion:1.7.4
  • Apache Software Foundation Subversion 1.7.5
    cpe:2.3:a:apache:subversion:1.7.5
  • Apache Software Foundation Subversion 1.7.6
    cpe:2.3:a:apache:subversion:1.7.6
  • Apache Software Foundation Subversion 1.7.7
    cpe:2.3:a:apache:subversion:1.7.7
  • OpenSUSE 12.1
    cpe:2.3:o:opensuse:opensuse:12.1
  • OpenSUSE 12.2
    cpe:2.3:o:opensuse:opensuse:12.2
  • OpenSUSE 12.3
    cpe:2.3:o:opensuse:opensuse:12.3
CVSS
Base: 4.0 (as of 03-05-2013 - 10:20)
Impact:
Exploitability:
CWE CWE-119
CAPEC
  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
  • Overflow Binary Resource File
    An attack of this type exploits a buffer overflow vulnerability in the handling of binary resources. Binary resources may include music files like MP3, image files like JPEG files, and any other binary file. These attacks may pass unnoticed to the client machine through normal usage of files, such as a browser loading a seemingly innocent JPEG file. This can allow the attacker access to the execution stack and execute arbitrary code in the target process. This attack pattern is a variant of standard buffer overflow attacks using an unexpected vector (binary files) to wrap its attack and open up a new attack vector. The attacker is required to either directly serve the binary content to the victim, or place it in a locale like a MP3 sharing application, for the victim to download. The attacker then is notified upon the download or otherwise locates the vulnerability opened up by the buffer overflow.
  • Buffer Overflow via Symbolic Links
    This type of attack leverages the use of symbolic links to cause buffer overflows. An attacker can try to create or manipulate a symbolic link file such that its contents result in out of bounds data. When the target software processes the symbolic link file, it could potentially overflow internal buffers with insufficient bounds checking.
  • Overflow Variables and Tags
    This type of attack leverages the use of tags or variables from a formatted configuration data to cause buffer overflow. The attacker crafts a malicious HTML page or configuration file that includes oversized strings, thus causing an overflow.
  • Buffer Overflow via Parameter Expansion
    In this attack, the target software is given input that the attacker knows will be modified and expanded in size during processing. This attack relies on the target software failing to anticipate that the expanded data may exceed some internal limit, thereby creating a buffer overflow.
  • Buffer Overflow in an API Call
    This attack targets libraries or shared code modules which are vulnerable to buffer overflow attacks. An attacker who has access to an API may try to embed malicious code in the API function call and exploit a buffer overflow vulnerability in the function's implementation. All clients that make use of the code library thus become vulnerable by association. This has a very broad effect on security across a system, usually affecting more than one software process.
  • Buffer Overflow in Local Command-Line Utilities
    This attack targets command-line utilities available in a number of shells. An attacker can leverage a vulnerability found in a command-line utility to escalate privilege to root.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE_INSTANCE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_B6BEB1379DC011E2882F20CF30E32F6D.NASL
    description Subversion team reports : Subversion's mod_dav_svn Apache HTTPD server module will use excessive amounts of memory when a large number of properties are set or deleted on a node. Subversion's mod_dav_svn Apache HTTPD server module will crash when a LOCK request is made against activity URLs. Subversion's mod_dav_svn Apache HTTPD server module will crash in some circumstances when a LOCK request is made against a non-existent URL. Subversion's mod_dav_svn Apache HTTPD server module will crash when a PROPFIND request is made against activity URLs. Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65849
    published 2013-04-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65849
    title FreeBSD : Subversion -- multiple vulnerabilities (b6beb137-9dc0-11e2-882f-20cf30e32f6d)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2013-095-01.NASL
    description New subversion packages are available for Slackware 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.
    last seen 2019-02-21
    modified 2013-06-01
    plugin id 65945
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65945
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / current : subversion (SSA:2013-095-01)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0737.NASL
    description Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65932
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65932
    title CentOS 5 / 6 : subversion (CESA-2013:0737)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-207.NASL
    description Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems : CVE-2015-0248 Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. CVE-2015-0251 Subversion HTTP servers allow spoofing svn:author property values for new revisions via specially crafted v1 HTTP protocol request sequences. CVE-2013-1845 Subversion mod_dav_svn was vulnerable to a denial of service attack through a remotely triggered memory exhaustion. CVE-2013-1846 / CVE-2013-1847 / CVE-2013-1849 / CVE-2014-0032 Subversion mod_dav_svn was vulnerable to multiple remotely triggered crashes. This update has been prepared by James McCoy. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 83060
    published 2015-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83060
    title Debian DLA-207-1 : subversion security update
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0737.NASL
    description From Red Hat Security Advisory 2013:0737 : Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68805
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68805
    title Oracle Linux 5 / 6 : subversion (ELSA-2013-0737)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130411_SUBVERSION_ON_SL5_X.NASL
    description A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 65957
    published 2013-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65957
    title Scientific Linux Security Update : subversion on SL5.x, SL6.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2013-345.NASL
    description Subversion received minor version updates to fix remote triggerable vulnerabilities in mod_dav_svn which may result in denial of service. On openSUSE 12.1 : - update to 1.6.21 [bnc#813913], addressing remotely triggerable + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existent URLs + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs - further changes : + mod_dav_svn will omit some property values for activity urls + improve memory usage when committing properties in mod_dav_svn + fix mod_dav_svn runs pre-revprop-change twice + fixed: post-revprop-change errors cancel commit + improved logic in mod_dav_svn's implementation of lock. + fix a compatibility issue with g++ 4.7 On openSUSE 12.2 and 12.3 : - update to 1.7.9 [bnc#813913], addressing remotely triggerable vulnerabilities in mod_dav_svn which may result in denial of service : + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existent URLs + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs + CVE-2013-1884: mod_dav_svn crashes on out of range limit in log REPORT - further changes : + Client-side bugfixes : - improved error messages about svn:date and svn:author props. - fix local_relpath assertion - fix memory leak in `svn log` over svn:// - fix incorrect authz failure when using neon http library - fix segfault when using kwallet + Server-side bugfixes : - svnserve will log the replayed rev not the low-water rev. - mod_dav_svn will omit some property values for activity urls - fix an assertion in mod_dav_svn when acting as a proxy on / - improve memory usage when committing properties in mod_dav_svn - fix svnrdump to load dump files with non-LF line endings - fix assertion when rep-cache is inaccessible - improved logic in mod_dav_svn's implementation of lock. - avoid executing unnecessary code in log with limit - Developer-visible changes : + General : - fix an assertion in dav_svn_get_repos_path() on Windows - fix get-deps.sh to correctly download zlib - doxygen docs will now ignore prefixes when producing the index - fix get-deps.sh on freebsd + Bindings : - javahl status api now respects the ignoreExternals boolean - refresh subversion-no-build-date.patch for upstream source changes
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74976
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74976
    title openSUSE Security Update : subversion (openSUSE-SU-2013:0687-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2013-0837-1.NASL
    description This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. (CVE-2013-1849, CVE-2013-1846, CVE-2013-1845) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-05-20
    plugin id 83584
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83584
    title SUSE SLED10 Security Update : subversion (SUSE-SU-2013:0837-1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2013-180.NASL
    description A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846 , CVE-2013-1847) Note: The CVE-2013-1849 , CVE-2013-1846 , and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 69739
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69739
    title Amazon Linux AMI : subversion (ALAS-2013-180)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2013-153.NASL
    description Multiple vulnerabilities has been found and corrected in subversion : Subversion's mod_dav_svn Apache HTTPD server module will use excessive amounts of memory when a large number of properties are set or deleted on a node. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1845). Subversion's mod_dav_svn Apache HTTPD server module will crash when a LOCK request is made against activity URLs. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1846). Subversion's mod_dav_svn Apache HTTPD server module will crash in some circumstances when a LOCK request is made against a non-existent URL. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1847). Subversion's mod_dav_svn Apache HTTPD server module will crash when a PROPFIND request is made against activity URLs. This can lead to a DoS. There are no known instances of this problem being observed in the wild, but the details of how to exploit it have been disclosed on the full disclosure mailing list (CVE-2013-1849). Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range. This can lead to a DoS. There are no known instances of this problem being used as a DoS in the wild (CVE-2013-1884). The updated packages have been upgraded to the 1.7.9 version which is not affected by these issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 66252
    published 2013-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66252
    title Mandriva Linux Security Advisory : subversion (MDVSA-2013:153)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201309-11.NASL
    description The remote host is affected by the vulnerability described in GLSA-201309-11 (Subversion: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 70084
    published 2013-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70084
    title GLSA-201309-11 : Subversion: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_CVS2SVN-8552.NASL
    description This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. (CVE-2013-1849 / CVE-2013-1846 / CVE-2013-1845)
    last seen 2019-02-21
    modified 2013-05-28
    plugin id 66617
    published 2013-05-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66617
    title SuSE 10 Security Update : subversion (ZYPP Patch Number 8552)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1893-1.NASL
    description Alexander Klink discovered that the Subversion mod_dav_svn module for Apache did not properly handle a large number of properties. A remote authenticated attacker could use this flaw to cause memory consumption, leading to a denial of service. (CVE-2013-1845) Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote authenticated attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1846) Philip Martin and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1847) It was discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain PROPFIND requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1849) Greg McMullin, Stefan Fuhrmann, Philip Martin, and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain log REPORT requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. This issue only affected Ubuntu 12.10 and Ubuntu 13.04. (CVE-2013-1884) Stefan Sperling discovered that Subversion incorrectly handled newline characters in filenames. A remote authenticated attacker could use this flaw to corrupt FSFS repositories. (CVE-2013-1968) Boris Lytochkin discovered that Subversion incorrectly handled TCP connections that were closed early. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-2112). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 67016
    published 2013-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67016
    title Ubuntu 12.04 LTS / 12.10 / 13.04 : subversion vulnerabilities (USN-1893-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0737.NASL
    description Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65938
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65938
    title RHEL 5 / 6 : subversion (RHSA-2013:0737)
  • NASL family Windows
    NASL id SUBVERSION_1_6_21.NASL
    description The version of Apache Subversion Server installed on the remote host is prior to 1.6.21 or 1.7.x prior to 1.7.9. It is, therefore, affected by multiple denial of service (DoS) vulnerabilities in the 'mod_dav_svn' Apache HTTPD server module : - A flaw exists in 'mod_dav_svn' that is triggered when handling node properties. (CVE-2013-1845) - A NULL pointer dereference exists in the 'mod_dav_svn' module, triggered during the handling of a crafted Log REPORT request, URL lock request, LOCK request against non-existent URL, or URL PROPFIND request. (CVE-2013-1846, CVE-2013-1847, CVE-2013-1849) - A NULL pointer dereference exists in the 'mod_dav_svn' module, triggered during the handling of a crafted Log REPORT request. This flaw reportedly affects Apache Subversion 1.7.x only. (CVE-2013-1884)
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 66474
    published 2013-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66474
    title Apache Subversion < 1.6.21 / 1.7.x < 1.7.9 Multiple DoS
oval via4
accepted 2015-05-04T04:00:08.687-04:00
class vulnerability
contributors
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
comment VisualSVN Server is installed
oval oval:org.mitre.oval:def:18636
description The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
family windows
id oval:org.mitre.oval:def:18087
status accepted
submitted 2013-10-02T13:00:00
title Apache Subversion vulnerability 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 in VisualSVN Server (CVE-2013-1846)
version 9
redhat via4
advisories
rhsa
id RHSA-2013:0737
rpms
  • mod_dav_svn-0:1.6.11-11.el5_9
  • subversion-0:1.6.11-11.el5_9
  • subversion-devel-0:1.6.11-11.el5_9
  • subversion-javahl-0:1.6.11-11.el5_9
  • subversion-perl-0:1.6.11-11.el5_9
  • subversion-ruby-0:1.6.11-11.el5_9
  • mod_dav_svn-0:1.6.11-9.el6_4
  • subversion-0:1.6.11-9.el6_4
  • subversion-devel-0:1.6.11-9.el6_4
  • subversion-gnome-0:1.6.11-9.el6_4
  • subversion-javahl-0:1.6.11-9.el6_4
  • subversion-kde-0:1.6.11-9.el6_4
  • subversion-perl-0:1.6.11-9.el6_4
  • subversion-ruby-0:1.6.11-9.el6_4
  • subversion-svn2cl-0:1.6.11-9.el6_4
refmap via4
confirm
mandriva MDVSA-2013:153
mlist
  • [subversion-announce] 20130404 Apache Subversion 1.7.9 released
  • [subversion-announce] 20130404 Subversion 1.6.21 released
suse
  • openSUSE-SU-2013:0687
  • openSUSE-SU-2013:0932
ubuntu USN-1893-1
Last major update 02-11-2013 - 23:31
Published 02-05-2013 - 10:55
Last modified 30-10-2018 - 12:27
Back to Top