Improper Access Control Affecting subversion package, versions <1.9.4-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-SUBVERSION-344328
- published 5 May 2016
- disclosed 5 May 2016
Introduced: 5 May 2016
CVE-2016-2167 Open this link in a new tabHow to fix?
Upgrade Debian:9
subversion
to version 1.9.4-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream subversion
package and not the subversion
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
References
- https://security-tracker.debian.org/tracker/CVE-2016-2167
- http://www.debian.org/security/2016/dsa-3561
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- https://security.gentoo.org/glsa/201610-05
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://www.securityfocus.com/bid/89417
- http://www.securitytracker.com/id/1035706
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-2167
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E