CPANSA-Alien-SVN-2016-2168-subversion: Alien-SVN vulnerability
| Publisher | giterlizzi | Document category | csaf_security_advisory |
|---|---|---|---|
| Initial release date | 2016-05-05T00:00:00 | Engine | CSAF Perl Toolkit 0.26 |
| Current release date | 2016-05-05T00:00:00 | Build Date | |
| Current version | 1 | Status | final |
| CVSS v3.1 Base Score | Severity | Medium | |
| Original language | Language | en | |
| Also referred to | |||
Vulnerability Description
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
Vulnerabilities
CVE-2016-2168
Vulnerability DescriptionProduct status
Known affected
| Product | Score | ||||
|---|---|---|---|---|---|
| Alien-SVN greater than or equal 1.4.5.0 and less than or equal 1.4.5.3 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Alien-SVN-2016-2168-subversion JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2016/cpansa-alien-svn-2016-2168-subversion.json - http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E external
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E - http://www.debian.org/security/2016/dsa-3561 external
http://www.debian.org/security/2016/dsa-3561 - http://subversion.apache.org/security/CVE-2016-2168-advisory.txt external
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt - http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E external
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E - http://www.securitytracker.com/id/1035707 external
http://www.securitytracker.com/id/1035707 - http://www.securityfocus.com/bid/89320 external
http://www.securityfocus.com/bid/89320 - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 external
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 - http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html external
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html - http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html external
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html external
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html - https://security.gentoo.org/glsa/201610-05 external
https://security.gentoo.org/glsa/201610-05 - https://www.oracle.com/security-alerts/cpuoct2020.html external
https://www.oracle.com/security-alerts/cpuoct2020.html - CVE-2016-2168 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2016-2168
Revision history
| Version | Date of the revision | Summary of the revision |
|---|---|---|
| 1 | Thu May 5 00:00:00 2016 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/