CPANSA-Alien-SVN-2016-2167-subversion: Alien-SVN vulnerability
| Publisher | giterlizzi | Document category | csaf_security_advisory |
|---|---|---|---|
| Initial release date | 2016-05-05T00:00:00 | Engine | CSAF Perl Toolkit 0.26 |
| Current release date | 2016-05-05T00:00:00 | Build Date | |
| Current version | 1 | Status | final |
| CVSS v3.1 Base Score | 6.8 | Severity | Medium |
| Original language | Language | en | |
| Also referred to | |||
Vulnerability Description
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
Vulnerabilities
CVE-2016-2167
Vulnerability DescriptionThe canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
| Weakness | CWE-284 : Improper Access Control |
|---|
Product status
Known affected
| Product | Score | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Alien-SVN greater than or equal 1.4.5.0 and less than or equal 1.4.5.3 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Alien-SVN-2016-2167-subversion JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2016/cpansa-alien-svn-2016-2167-subversion.json - http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E external
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E - http://www.debian.org/security/2016/dsa-3561 external
http://www.debian.org/security/2016/dsa-3561 - http://www.securitytracker.com/id/1035706 external
http://www.securitytracker.com/id/1035706 - http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E external
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E - http://subversion.apache.org/security/CVE-2016-2167-advisory.txt external
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt - http://www.securityfocus.com/bid/89417 external
http://www.securityfocus.com/bid/89417 - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 external
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 - http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html external
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html - http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html external
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html external
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html - https://security.gentoo.org/glsa/201610-05 external
https://security.gentoo.org/glsa/201610-05 - https://www.oracle.com/security-alerts/cpuoct2020.html external
https://www.oracle.com/security-alerts/cpuoct2020.html - CVE-2016-2167 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2016-2167
Revision history
| Version | Date of the revision | Summary of the revision |
|---|---|---|
| 1 | Thu May 5 00:00:00 2016 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/