Lucene search

K
archlinuxArchLinuxASA-201908-10
HistoryAug 16, 2019 - 12:00 a.m.

[ASA-201908-10] subversion: denial of service

2019-08-1600:00:00
security.archlinux.org
11

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

47.5%

Arch Linux Security Advisory ASA-201908-10

Severity: High
Date : 2019-08-16
CVE-ID : CVE-2018-11782 CVE-2019-0203
Package : subversion
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1016

Summary

The package subversion before version 1.12.2-1 is vulnerable to denial
of service.

Resolution

Upgrade to 1.12.2-1.

pacman -Syu “subversion>=1.12.2-1”

The problems have been fixed upstream in version 1.12.2.

Workaround

None.

Description

  • CVE-2018-11782 (denial of service)

Subversion svn:// connections, including svn+ssh:// and
svn+<custom>://, use a custom network protocol [1] with Lisp-like
syntax. The code implementing the protocol has dedicated codepaths for
serialization of revision numbers into protocol integers. A particular
client query could cause the server to attempt to reply with a revision
number whose value is the invalid revision number constant
SVN_INVALID_REVNUM, thereby triggering an assertion failure in the
the serialization layer.

  • CVE-2019-0203 (denial of service)

A null-pointer-dereference has been found in svnserve that results in a
remote unauthenticated Denial-of-Service in some server configurations.
The vulnerability can be triggered by an unauthenticated user if the
server is configured with anonymous access enabled.

Impact

A remote attacker is able to cause a denial of service by sending a
special packet.

References

http://subversion.apache.org/security/CVE-2018-11782-advisory.txt
http://subversion.apache.org/security/CVE-2019-0203-advisory.txt
https://security.archlinux.org/CVE-2018-11782
https://security.archlinux.org/CVE-2019-0203

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanysubversion< 1.12.2-1UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

47.5%