Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.68938
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-1053-1 (subversion)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to subversion
announced via advisory USN-1053-1.

Details follow:

It was discovered that Subversion incorrectly handled certain 'partial
access' privileges in rare scenarios. Remote authenticated users could use
this flaw to obtain sensitive information (revision properties). This issue
only applied to Ubuntu 6.06 LTS. (CVE-2007-2448)

It was discovered that the Subversion mod_dav_svn module for Apache did not
properly handle a named repository as a rule scope. Remote authenticated
users could use this flaw to bypass intended restrictions. This issue only
applied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-3315)

It was discovered that the Subversion mod_dav_svn module for Apache
incorrectly handled the walk function. Remote authenticated users could use
this flaw to cause the service to crash, leading to a denial of service.
(CVE-2010-4539)

It was discovered that Subversion incorrectly handled certain memory
operations. Remote authenticated users could use this flaw to consume large
quantities of memory and cause the service to crash, leading to a denial of
service. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10.
(CVE-2010-4644)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libapache2-svn 1.3.1-3ubuntu1.3
libsvn0 1.3.1-3ubuntu1.3

Ubuntu 8.04 LTS:
libapache2-svn 1.4.6dfsg1-2ubuntu1.2
libsvn1 1.4.6dfsg1-2ubuntu1.2

Ubuntu 9.10:
libapache2-svn 1.6.5dfsg-1ubuntu1.1
libsvn1 1.6.5dfsg-1ubuntu1.1

Ubuntu 10.04 LTS:
libapache2-svn 1.6.6dfsg-2ubuntu1.1
libsvn1 1.6.6dfsg-2ubuntu1.1

Ubuntu 10.10:
libapache2-svn 1.6.12dfsg-1ubuntu1.1
libsvn1 1.6.12dfsg-1ubuntu1.1

After a standard system update you need to restart any applications that
use Subversion, such as Apache when using mod_dav_svn, to make all the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-1053-1

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2448
1018237
http://securitytracker.com/id?1018237
24463
http://www.securityfocus.com/bid/24463
36070
http://osvdb.org/36070
43139
http://secunia.com/advisories/43139
ADV-2007-2230
http://www.vupen.com/english/advisories/2007/2230
ADV-2011-0264
http://www.vupen.com/english/advisories/2011/0264
USN-1053-1
http://www.ubuntu.com/usn/USN-1053-1
http://subversion.tigris.org/security/CVE-2007-2448-advisory.txt
https://issues.rpath.com/browse/RPL-1896
Common Vulnerability Exposure (CVE) ID: CVE-2010-3315
41652
http://secunia.com/advisories/41652
43346
http://secunia.com/advisories/43346
APPLE-SA-2011-03-21-1
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
DSA-2118
http://www.debian.org/security/2010/dsa-2118
MDVSA-2010:199
http://www.mandriva.com/security/advisories?name=MDVSA-2010:199
RHSA-2011:0258
http://www.redhat.com/support/errata/RHSA-2011-0258.html
SUSE-SR:2010:024
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
http://security-tracker.debian.org/tracker/CVE-2010-3315
http://subversion.apache.org/security/CVE-2010-3315-advisory.txt
http://support.apple.com/kb/HT4581
oval:org.mitre.oval:def:19007
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19007
Common Vulnerability Exposure (CVE) ID: CVE-2010-4539
1024934
http://www.securitytracker.com/id?1024934
42780
http://secunia.com/advisories/42780
42969
http://secunia.com/advisories/42969
43115
http://secunia.com/advisories/43115
45655
http://www.securityfocus.com/bid/45655
ADV-2011-0015
http://www.vupen.com/english/advisories/2011/0015
ADV-2011-0103
http://www.vupen.com/english/advisories/2011/0103
ADV-2011-0162
http://www.vupen.com/english/advisories/2011/0162
FEDORA-2011-0099
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html
MDVSA-2011:006
http://www.mandriva.com/security/advisories?name=MDVSA-2011:006
RHSA-2011:0257
http://www.redhat.com/support/errata/RHSA-2011-0257.html
SUSE-SR:2011:005
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[oss-security] 20110102 CVE request for subversion
http://openwall.com/lists/oss-security/2011/01/02/1
[oss-security] 20110103 Re: CVE request for subversion
http://openwall.com/lists/oss-security/2011/01/03/9
[oss-security] 20110104 Re: CVE request for subversion
http://openwall.com/lists/oss-security/2011/01/04/10
http://openwall.com/lists/oss-security/2011/01/04/8
[oss-security] 20110105 Re: CVE request for subversion
http://openwall.com/lists/oss-security/2011/01/05/4
[subversion-users] 20101104 apache coredump in mod_dav_svn
http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E
[www-announce] 20101124 Apache Subversion 1.6.15 Released
http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E
http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES
http://svn.apache.org/viewvc?view=revision&revision=1033166
https://bugzilla.redhat.com/show_bug.cgi?id=667407
subversion-walk-dos(64472)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64472
Common Vulnerability Exposure (CVE) ID: CVE-2010-4644
1024935
http://www.securitytracker.com/id?1024935
[dev] 20101104 "svn blame -g" causing svnserve to hang & mem usage to hit 2GB
http://svn.haxx.se/dev/archive-2010-11/0102.shtml
[subversion-users] 20101104 svnserve.exe (Win32) using 2GB of memory and then crashing?
http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C4CD33B61.7030203%40thepond.com%3E
http://svn.apache.org/viewvc?view=revision&revision=1032808
subversion-blameg-dos(64473)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64473
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.