CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
AI Score
Confidence
Low
EPSS
Percentile
84.7%
The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | subversion | * | cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* |
apache | subversion | 0.6 | cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:* |
apache | subversion | 0.7 | cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:* |
apache | subversion | 0.8 | cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:* |
apache | subversion | 0.9 | cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:* |
apache | subversion | 0.10.0 | cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:* |
apache | subversion | 0.10.1 | cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:* |
apache | subversion | 0.10.2 | cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:* |
apache | subversion | 0.11.1 | cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:* |
apache | subversion | 0.12.0 | cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html
lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E
mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E
openwall.com/lists/oss-security/2011/01/02/1
openwall.com/lists/oss-security/2011/01/03/9
openwall.com/lists/oss-security/2011/01/04/10
openwall.com/lists/oss-security/2011/01/04/8
openwall.com/lists/oss-security/2011/01/05/4
secunia.com/advisories/42780
secunia.com/advisories/42969
secunia.com/advisories/43115
secunia.com/advisories/43139
secunia.com/advisories/43346
svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES
svn.apache.org/viewvc?view=revision&revision=1033166
www.mandriva.com/security/advisories?name=MDVSA-2011:006
www.redhat.com/support/errata/RHSA-2011-0257.html
www.redhat.com/support/errata/RHSA-2011-0258.html
www.securityfocus.com/bid/45655
www.securitytracker.com/id?1024934
www.ubuntu.com/usn/USN-1053-1
www.vupen.com/english/advisories/2011/0015
www.vupen.com/english/advisories/2011/0103
www.vupen.com/english/advisories/2011/0162
www.vupen.com/english/advisories/2011/0264
bugzilla.redhat.com/show_bug.cgi?id=667407
exchange.xforce.ibmcloud.com/vulnerabilities/64472