ID CVE-2004-0397
Summary Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.
References
Vulnerable Configurations
  • cpe:2.3:a:subversion:subversion:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:subversion:subversion:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:subversion:subversion:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:subversion:subversion:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:subversion:subversion:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:subversion:subversion:1.0.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 10386
bugtraq
  • 20040519 Advisory 08/2004: Subversion remote vulnerability
  • 20040519 [OpenPKG-SA-2004.023] OpenPKG Security Advisory (subversion)
confirm http://subversion.tigris.org/svn-sscanf-advisory.txt
fedora
  • FEDORA-2004-128
  • FLSA:1748
fulldisc 20040519 Advisory 08/2004: Subversion remote vulnerability
gentoo GLSA-200405-14
misc http://security.e-matters.de/advisories/082004.html
osvdb 6301
secunia
  • 11642
  • 11675
xf subversion-date-parsing-command-execution(16191)
Last major update 11-07-2017 - 01:30
Published 07-07-2004 - 04:00
Last modified 11-07-2017 - 01:30
Back to Top