Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52460
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: subversion
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: subversion

CVE-2004-0397
Stack-based buffer overflow during the apr_time_t data conversion in
Subversion 1.0.2 and earlier allows remote attackers to execute
arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev
svn-protocol command.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2004-0397
BugTraq ID: 10386
http://www.securityfocus.com/bid/10386
Bugtraq: 20040519 Advisory 08/2004: Subversion remote vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=108498676517697&w=2
Bugtraq: 20040519 [OpenPKG-SA-2004.023] OpenPKG Security Advisory (subversion) (Google Search)
http://www.securityfocus.com/archive/1/363814
http://www.linuxsecurity.com/advisories/fedora_advisory-4373.html
https://bugzilla.fedora.us/show_bug.cgi?id=1748
http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021737.html
http://www.gentoo.org/security/en/glsa/glsa-200405-14.xml
http://security.e-matters.de/advisories/082004.html
http://www.osvdb.org/6301
http://secunia.com/advisories/11642
http://secunia.com/advisories/11675
XForce ISS Database: subversion-date-parsing-command-execution(16191)
https://exchange.xforce.ibmcloud.com/vulnerabilities/16191
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.