5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
47.5%
Package : subversion
Version : 1.8.10-6+deb8u7
CVE ID : CVE-2018-11782 CVE-2019-0203
Several vulnerabilities were discovered in Subversion, a version control
system. The Common Vulnerabilities and Exposures project identifies the
following problems:
CVE-2018-11782
Ace Olszowka reported that the Subversion's svnserve server process
may exit when a well-formed read-only request produces a particular
answer, leading to a denial of service.
CVE-2019-0203
Tomas Bortoli reported that the Subversion's svnserve server process
may exit when a client sends certain sequences of protocol commands.
If the server is configured with anonymous access enabled this could
lead to a remote unauthenticated denial of service.
For Debian 8 "Jessie", these problems have been fixed in version
1.8.10-6+deb8u7.
We recommend that you upgrade your subversion packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | amd64 | libsvn-perl-dbgsym | < 1.9.5-1+deb9u4 | libsvn-perl-dbgsym_1.9.5-1+deb9u4_amd64.deb |
Debian | 10 | armel | libsvn1-dbgsym | < 1.10.4-1+deb10u1 | libsvn1-dbgsym_1.10.4-1+deb10u1_armel.deb |
Debian | 9 | mips | libsvn-java | < 1.9.5-1+deb9u4 | libsvn-java_1.9.5-1+deb9u4_mips.deb |
Debian | 9 | s390x | subversion-dbgsym | < 1.9.5-1+deb9u4 | subversion-dbgsym_1.9.5-1+deb9u4_s390x.deb |
Debian | 8 | amd64 | ruby-svn | < 1.8.10-6+deb8u7 | ruby-svn_1.8.10-6+deb8u7_amd64.deb |
Debian | 9 | s390x | python-subversion-dbgsym | < 1.9.5-1+deb9u4 | python-subversion-dbgsym_1.9.5-1+deb9u4_s390x.deb |
Debian | 8 | amd64 | libsvn1 | < 1.8.10-6+deb8u7 | libsvn1_1.8.10-6+deb8u7_amd64.deb |
Debian | 10 | amd64 | ruby-svn-dbgsym | < 1.10.4-1+deb10u1 | ruby-svn-dbgsym_1.10.4-1+deb10u1_amd64.deb |
Debian | 9 | mips64el | subversion | < 1.9.5-1+deb9u4 | subversion_1.9.5-1+deb9u4_mips64el.deb |
Debian | 8 | amd64 | python-subversion | < 1.8.10-6+deb8u7 | python-subversion_1.8.10-6+deb8u7_amd64.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
47.5%