Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.831366
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Update for subversion MDVSA-2011:067 (subversion)
Zusammenfassung:The remote host is missing an update for the 'subversion'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'subversion'
package(s) announced via the referenced advisory.

Vulnerability Insight:
A vulnerability was discovered and corrected in subversion:

The mod_dav_svn module for the Apache HTTP Server, as distributed in
Apache Subversion before 1.6.16, allows remote attackers to cause a
denial of service (NULL pointer dereference and daemon crash) via a
request that contains a lock token (CVE-2011-0715).

Additionally for Corporate Server 4 and Enterprise Server 5 subversion
have been upgraded to the 1.6.16 version due to of numerous upstream
fixes and new features, the serf packages has also been upgraded to
the now required 0.3.0 version.

Packages for 2009.0 are provided as of the Extended Maintenance
Program. The updated packages have been upgraded to the 1.6.16 version which
is not vulnerable to this issue.

Affected Software/OS:
subversion on Mandriva Linux 2009.0,
Mandriva Linux 2009.0/X86_64,
Mandriva Linux 2010.0,
Mandriva Linux 2010.0/X86_64,
Mandriva Linux 2010.1,
Mandriva Linux 2010.1/X86_64,
Mandriva Enterprise Server 5,
Mandriva Enterprise Server 5/X86_64

Solution:
Please Install the Updated Packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-0715
1025161
http://securitytracker.com/id?1025161
43583
http://secunia.com/advisories/43583
43603
http://secunia.com/advisories/43603
43672
http://secunia.com/advisories/43672
43794
http://secunia.com/advisories/43794
46734
http://www.securityfocus.com/bid/46734
70964
http://www.osvdb.org/70964
ADV-2011-0567
http://www.vupen.com/english/advisories/2011/0567
ADV-2011-0568
http://www.vupen.com/english/advisories/2011/0568
ADV-2011-0624
http://www.vupen.com/english/advisories/2011/0624
ADV-2011-0660
http://www.vupen.com/english/advisories/2011/0660
ADV-2011-0684
http://www.vupen.com/english/advisories/2011/0684
ADV-2011-0776
http://www.vupen.com/english/advisories/2011/0776
ADV-2011-0885
http://www.vupen.com/english/advisories/2011/0885
APPLE-SA-2011-06-23-1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
DSA-2181
http://www.debian.org/security/2011/dsa-2181
FEDORA-2011-2657
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html
FEDORA-2011-2698
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html
FEDORA-2011-3775
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html
MDVSA-2011:067
http://www.mandriva.com/security/advisories?name=MDVSA-2011:067
RHSA-2011:0327
https://rhn.redhat.com/errata/RHSA-2011-0327.html
RHSA-2011:0328
https://rhn.redhat.com/errata/RHSA-2011-0328.html
SSA:2011-070-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.479953
SUSE-SR:2011:005
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
USN-1096-1
http://www.ubuntu.com/usn/USN-1096-1
[dev] 20110303 Subversion 1.6.16 Released
http://svn.haxx.se/dev/archive-2011-03/0122.shtml
http://subversion.apache.org/security/CVE-2011-0715-advisory.txt
http://support.apple.com/kb/HT4723
http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES
http://svn.apache.org/viewvc?view=revision&revision=1071239
http://svn.apache.org/viewvc?view=revision&revision=1071307
https://bugzilla.redhat.com/show_bug.cgi?id=680755
oval:org.mitre.oval:def:18967
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967
subversion-moddavsvn-dos(65876)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65876
CopyrightCopyright (C) 2011 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.