Improper Input Validation Affecting subversion package, versions <1.8.8-1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-SUBVERSION-344403
- published 14 Feb 2014
- disclosed 14 Feb 2014
Introduced: 14 Feb 2014
CVE-2014-0032 Open this link in a new tabHow to fix?
Upgrade Debian:9
subversion
to version 1.8.8-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream subversion
package and not the subversion
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
References
- https://security-tracker.debian.org/tracker/CVE-2014-0032
- http://support.apple.com/kb/HT6444
- https://security.gentoo.org/glsa/201610-05
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502@reser.org%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf@ntlworld.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA@mail.gmail.com%3E
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://rhn.redhat.com/errata/RHSA-2014-0255.html
- http://secunia.com/advisories/56822
- http://secunia.com/advisories/60722
- http://secunia.com/advisories/61321
- http://www.securityfocus.com/bid/65434
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-0032
- http://www.ubuntu.com/usn/USN-2316-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90986
- http://www.osvdb.org/102927
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E