ID CVE-2013-1849
Summary The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
References
Vulnerable Configurations
  • Apache Software Foundation Subversion 1.6.14
    cpe:2.3:a:apache:subversion:1.6.14
  • Apache Software Foundation Subversion 1.6.16
    cpe:2.3:a:apache:subversion:1.6.16
  • Apache Software Foundation Subversion 1.6.15
    cpe:2.3:a:apache:subversion:1.6.15
  • Apache Software Foundation Subversion 1.6.3
    cpe:2.3:a:apache:subversion:1.6.3
  • Apache Software Foundation Subversion 1.6.2
    cpe:2.3:a:apache:subversion:1.6.2
  • Apache Software Foundation Subversion 1.6.1
    cpe:2.3:a:apache:subversion:1.6.1
  • Apache Software Foundation Subversion 1.6.0
    cpe:2.3:a:apache:subversion:1.6.0
  • Apache Software Foundation Subversion 1.6.7
    cpe:2.3:a:apache:subversion:1.6.7
  • Apache Software Foundation Subversion 1.6.6
    cpe:2.3:a:apache:subversion:1.6.6
  • Apache Software Foundation Subversion 1.6.5
    cpe:2.3:a:apache:subversion:1.6.5
  • Apache Software Foundation Subversion 1.6.4
    cpe:2.3:a:apache:subversion:1.6.4
  • Apache Software Foundation Subversion 1.6.11
    cpe:2.3:a:apache:subversion:1.6.11
  • Apache Software Foundation Subversion 1.6.10
    cpe:2.3:a:apache:subversion:1.6.10
  • Apache Software Foundation Subversion 1.6.9
    cpe:2.3:a:apache:subversion:1.6.9
  • Apache Software Foundation Subversion 1.6.13
    cpe:2.3:a:apache:subversion:1.6.13
  • Apache Software Foundation Subversion 1.6.8
    cpe:2.3:a:apache:subversion:1.6.8
  • Apache Software Foundation Subversion 1.6.17
    cpe:2.3:a:apache:subversion:1.6.17
  • Apache Software Foundation Subversion 1.6.12
    cpe:2.3:a:apache:subversion:1.6.12
  • Apache Software Foundation Subversion 1.6.18
    cpe:2.3:a:apache:subversion:1.6.18
  • Apache Software Foundation Subversion 1.6.19
    cpe:2.3:a:apache:subversion:1.6.19
  • Apache Software Foundation Subversion 1.6.20
    cpe:2.3:a:apache:subversion:1.6.20
  • Apache Software Foundation Subversion 1.7.0
    cpe:2.3:a:apache:subversion:1.7.0
  • Apache Software Foundation Subversion 1.7.1
    cpe:2.3:a:apache:subversion:1.7.1
  • Apache Software Foundation Subversion 1.7.2
    cpe:2.3:a:apache:subversion:1.7.2
  • Apache Software Foundation Subversion 1.7.3
    cpe:2.3:a:apache:subversion:1.7.3
  • Apache Software Foundation Subversion 1.7.4
    cpe:2.3:a:apache:subversion:1.7.4
  • Apache Software Foundation Subversion 1.7.5
    cpe:2.3:a:apache:subversion:1.7.5
  • Apache Software Foundation Subversion 1.7.6
    cpe:2.3:a:apache:subversion:1.7.6
  • Apache Software Foundation Subversion 1.7.7
    cpe:2.3:a:apache:subversion:1.7.7
  • Apache Software Foundation Subversion 1.7.8
    cpe:2.3:a:apache:subversion:1.7.8
CVSS
Base: 4.3 (as of 03-05-2013 - 10:36)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_B6BEB1379DC011E2882F20CF30E32F6D.NASL
    description Subversion team reports : Subversion's mod_dav_svn Apache HTTPD server module will use excessive amounts of memory when a large number of properties are set or deleted on a node. Subversion's mod_dav_svn Apache HTTPD server module will crash when a LOCK request is made against activity URLs. Subversion's mod_dav_svn Apache HTTPD server module will crash in some circumstances when a LOCK request is made against a non-existent URL. Subversion's mod_dav_svn Apache HTTPD server module will crash when a PROPFIND request is made against activity URLs. Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65849
    published 2013-04-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65849
    title FreeBSD : Subversion -- multiple vulnerabilities (b6beb137-9dc0-11e2-882f-20cf30e32f6d)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2013-095-01.NASL
    description New subversion packages are available for Slackware 13.0, 13.1, 13.37, 14.0, and -current to fix security issues.
    last seen 2019-02-21
    modified 2013-06-01
    plugin id 65945
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65945
    title Slackware 13.0 / 13.1 / 13.37 / 14.0 / current : subversion (SSA:2013-095-01)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0737.NASL
    description Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65932
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65932
    title CentOS 5 / 6 : subversion (CESA-2013:0737)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DLA-207.NASL
    description Several vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems : CVE-2015-0248 Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. CVE-2015-0251 Subversion HTTP servers allow spoofing svn:author property values for new revisions via specially crafted v1 HTTP protocol request sequences. CVE-2013-1845 Subversion mod_dav_svn was vulnerable to a denial of service attack through a remotely triggered memory exhaustion. CVE-2013-1846 / CVE-2013-1847 / CVE-2013-1849 / CVE-2014-0032 Subversion mod_dav_svn was vulnerable to multiple remotely triggered crashes. This update has been prepared by James McCoy. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-06
    plugin id 83060
    published 2015-04-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83060
    title Debian DLA-207-1 : subversion security update
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0737.NASL
    description From Red Hat Security Advisory 2013:0737 : Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68805
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68805
    title Oracle Linux 5 / 6 : subversion (ELSA-2013-0737)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130411_SUBVERSION_ON_SL5_X.NASL
    description A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 65957
    published 2013-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65957
    title Scientific Linux Security Update : subversion on SL5.x, SL6.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2013-345.NASL
    description Subversion received minor version updates to fix remote triggerable vulnerabilities in mod_dav_svn which may result in denial of service. On openSUSE 12.1 : - update to 1.6.21 [bnc#813913], addressing remotely triggerable + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existent URLs + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs - further changes : + mod_dav_svn will omit some property values for activity urls + improve memory usage when committing properties in mod_dav_svn + fix mod_dav_svn runs pre-revprop-change twice + fixed: post-revprop-change errors cancel commit + improved logic in mod_dav_svn's implementation of lock. + fix a compatibility issue with g++ 4.7 On openSUSE 12.2 and 12.3 : - update to 1.7.9 [bnc#813913], addressing remotely triggerable vulnerabilities in mod_dav_svn which may result in denial of service : + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existent URLs + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs + CVE-2013-1884: mod_dav_svn crashes on out of range limit in log REPORT - further changes : + Client-side bugfixes : - improved error messages about svn:date and svn:author props. - fix local_relpath assertion - fix memory leak in `svn log` over svn:// - fix incorrect authz failure when using neon http library - fix segfault when using kwallet + Server-side bugfixes : - svnserve will log the replayed rev not the low-water rev. - mod_dav_svn will omit some property values for activity urls - fix an assertion in mod_dav_svn when acting as a proxy on / - improve memory usage when committing properties in mod_dav_svn - fix svnrdump to load dump files with non-LF line endings - fix assertion when rep-cache is inaccessible - improved logic in mod_dav_svn's implementation of lock. - avoid executing unnecessary code in log with limit - Developer-visible changes : + General : - fix an assertion in dav_svn_get_repos_path() on Windows - fix get-deps.sh to correctly download zlib - doxygen docs will now ignore prefixes when producing the index - fix get-deps.sh on freebsd + Bindings : - javahl status api now respects the ignoreExternals boolean - refresh subversion-no-build-date.patch for upstream source changes
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74976
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74976
    title openSUSE Security Update : subversion (openSUSE-SU-2013:0687-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2013-0837-1.NASL
    description This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. (CVE-2013-1849, CVE-2013-1846, CVE-2013-1845) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-05-20
    plugin id 83584
    published 2015-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=83584
    title SUSE SLED10 Security Update : subversion (SUSE-SU-2013:0837-1)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_SUBVERSION_20140401.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL. (CVE-2013-1849) - The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request. (CVE-2013-4505)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80777
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80777
    title Oracle Solaris Third-Party Patch Update : subversion (cve_2009_0179_denial_of1)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2013-180.NASL
    description A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846 , CVE-2013-1847) Note: The CVE-2013-1849 , CVE-2013-1846 , and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted.
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 69739
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69739
    title Amazon Linux AMI : subversion (ALAS-2013-180)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2013-153.NASL
    description Multiple vulnerabilities has been found and corrected in subversion : Subversion's mod_dav_svn Apache HTTPD server module will use excessive amounts of memory when a large number of properties are set or deleted on a node. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1845). Subversion's mod_dav_svn Apache HTTPD server module will crash when a LOCK request is made against activity URLs. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1846). Subversion's mod_dav_svn Apache HTTPD server module will crash in some circumstances when a LOCK request is made against a non-existent URL. This can lead to a DoS. There are no known instances of this problem being observed in the wild (CVE-2013-1847). Subversion's mod_dav_svn Apache HTTPD server module will crash when a PROPFIND request is made against activity URLs. This can lead to a DoS. There are no known instances of this problem being observed in the wild, but the details of how to exploit it have been disclosed on the full disclosure mailing list (CVE-2013-1849). Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range. This can lead to a DoS. There are no known instances of this problem being used as a DoS in the wild (CVE-2013-1884). The updated packages have been upgraded to the 1.7.9 version which is not affected by these issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 66252
    published 2013-04-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66252
    title Mandriva Linux Security Advisory : subversion (MDVSA-2013:153)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201309-11.NASL
    description The remote host is affected by the vulnerability described in GLSA-201309-11 (Subversion: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 70084
    published 2013-09-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70084
    title GLSA-201309-11 : Subversion: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_CVS2SVN-8552.NASL
    description This update fixes several DoS vulnerabilities in subversion's mod_dav_svn Apache HTTPD server module. (CVE-2013-1849 / CVE-2013-1846 / CVE-2013-1845)
    last seen 2019-02-21
    modified 2013-05-28
    plugin id 66617
    published 2013-05-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66617
    title SuSE 10 Security Update : subversion (ZYPP Patch Number 8552)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1893-1.NASL
    description Alexander Klink discovered that the Subversion mod_dav_svn module for Apache did not properly handle a large number of properties. A remote authenticated attacker could use this flaw to cause memory consumption, leading to a denial of service. (CVE-2013-1845) Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote authenticated attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1846) Philip Martin and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1847) It was discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain PROPFIND requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1849) Greg McMullin, Stefan Fuhrmann, Philip Martin, and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain log REPORT requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. This issue only affected Ubuntu 12.10 and Ubuntu 13.04. (CVE-2013-1884) Stefan Sperling discovered that Subversion incorrectly handled newline characters in filenames. A remote authenticated attacker could use this flaw to corrupt FSFS repositories. (CVE-2013-1968) Boris Lytochkin discovered that Subversion incorrectly handled TCP connections that were closed early. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-2112). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 67016
    published 2013-06-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=67016
    title Ubuntu 12.04 LTS / 12.10 / 13.04 : subversion vulnerabilities (USN-1893-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0737.NASL
    description Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled PROPFIND requests on activity URLs. A remote attacker could use this flaw to cause the httpd process serving the request to crash. (CVE-2013-1849) A flaw was found in the way the mod_dav_svn module handled large numbers of properties (such as those set with the 'svn propset' command). A malicious, remote user could use this flaw to cause the httpd process serving the request to consume an excessive amount of system memory. (CVE-2013-1845) Two NULL pointer dereference flaws were found in the way the mod_dav_svn module handled LOCK requests on certain types of URLs. A malicious, remote user could use these flaws to cause the httpd process serving the request to crash. (CVE-2013-1846, CVE-2013-1847) Note: The CVE-2013-1849, CVE-2013-1846, and CVE-2013-1847 issues only caused a temporary denial of service, as the Apache HTTP Server started a new process to replace the crashed child process. When using prefork MPM, the crash only affected the attacker. When using worker (threaded) MPM, the connections of other users may have been interrupted. Red Hat would like to thank the Apache Subversion project for reporting these issues. Upstream acknowledges Alexander Klink as the original reporter of CVE-2013-1845; Ben Reser as the original reporter of CVE-2013-1846; and Philip Martin and Ben Reser as the original reporters of CVE-2013-1847. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65938
    published 2013-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65938
    title RHEL 5 / 6 : subversion (RHSA-2013:0737)
  • NASL family Windows
    NASL id SUBVERSION_1_6_21.NASL
    description The version of Apache Subversion Server installed on the remote host is prior to 1.6.21 or 1.7.x prior to 1.7.9. It is, therefore, affected by multiple denial of service (DoS) vulnerabilities in the 'mod_dav_svn' Apache HTTPD server module : - A flaw exists in 'mod_dav_svn' that is triggered when handling node properties. (CVE-2013-1845) - A NULL pointer dereference exists in the 'mod_dav_svn' module, triggered during the handling of a crafted Log REPORT request, URL lock request, LOCK request against non-existent URL, or URL PROPFIND request. (CVE-2013-1846, CVE-2013-1847, CVE-2013-1849) - A NULL pointer dereference exists in the 'mod_dav_svn' module, triggered during the handling of a crafted Log REPORT request. This flaw reportedly affects Apache Subversion 1.7.x only. (CVE-2013-1884)
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 66474
    published 2013-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=66474
    title Apache Subversion < 1.6.21 / 1.7.x < 1.7.9 Multiple DoS
oval via4
accepted 2015-05-04T04:00:12.997-04:00
class vulnerability
contributors
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
comment VisualSVN Server is installed
oval oval:org.mitre.oval:def:18636
description The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
family windows
id oval:org.mitre.oval:def:18980
status accepted
submitted 2013-10-02T13:00:00
title Apache Subversion vulnerability 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 in VisualSVN Server (CVE-2013-1849)
version 8
redhat via4
advisories
bugzilla
id 929093
title CVE-2013-1849 Subversion (mod_dav_svn): DoS (crash) via PROPFIND request made against activity URLs
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment mod_dav_svn is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737004
        • comment mod_dav_svn is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203020
      • AND
        • comment subversion is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737002
        • comment subversion is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203012
      • AND
        • comment subversion-devel is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737012
        • comment subversion-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203016
      • AND
        • comment subversion-javahl is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737008
        • comment subversion-javahl is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203014
      • AND
        • comment subversion-perl is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737010
        • comment subversion-perl is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203022
      • AND
        • comment subversion-ruby is earlier than 0:1.6.11-11.el5_9
          oval oval:com.redhat.rhsa:tst:20130737006
        • comment subversion-ruby is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091203018
  • AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment mod_dav_svn is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737024
        • comment mod_dav_svn is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258014
      • AND
        • comment subversion is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737018
        • comment subversion is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258006
      • AND
        • comment subversion-devel is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737022
        • comment subversion-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258020
      • AND
        • comment subversion-gnome is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737030
        • comment subversion-gnome is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258018
      • AND
        • comment subversion-javahl is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737028
        • comment subversion-javahl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258022
      • AND
        • comment subversion-kde is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737020
        • comment subversion-kde is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258010
      • AND
        • comment subversion-perl is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737026
        • comment subversion-perl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258016
      • AND
        • comment subversion-ruby is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737032
        • comment subversion-ruby is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258008
      • AND
        • comment subversion-svn2cl is earlier than 0:1.6.11-9.el6_4
          oval oval:com.redhat.rhsa:tst:20130737034
        • comment subversion-svn2cl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110258012
rhsa
id RHSA-2013:0737
released 2013-04-11
severity Moderate
title RHSA-2013:0737: subversion security update (Moderate)
rpms
  • mod_dav_svn-0:1.6.11-11.el5_9
  • subversion-0:1.6.11-11.el5_9
  • subversion-devel-0:1.6.11-11.el5_9
  • subversion-javahl-0:1.6.11-11.el5_9
  • subversion-perl-0:1.6.11-11.el5_9
  • subversion-ruby-0:1.6.11-11.el5_9
  • mod_dav_svn-0:1.6.11-9.el6_4
  • subversion-0:1.6.11-9.el6_4
  • subversion-devel-0:1.6.11-9.el6_4
  • subversion-gnome-0:1.6.11-9.el6_4
  • subversion-javahl-0:1.6.11-9.el6_4
  • subversion-kde-0:1.6.11-9.el6_4
  • subversion-perl-0:1.6.11-9.el6_4
  • subversion-ruby-0:1.6.11-9.el6_4
  • subversion-svn2cl-0:1.6.11-9.el6_4
refmap via4
confirm
fulldisc 20130305 Apache Subversion mod_dav_svn DoS via MKACTIVITY/PROPFIND
mandriva MDVSA-2013:153
mlist
  • [subversion-announce] 20130404 Apache Subversion 1.7.9 released
  • [subversion-announce] 20130404 Subversion 1.6.21 released
suse
  • openSUSE-SU-2013:0687
  • openSUSE-SU-2013:0932
ubuntu USN-1893-1
Last major update 02-11-2013 - 23:31
Published 02-05-2013 - 10:55
Last modified 18-09-2017 - 21:36
Back to Top