![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.870444 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for subversion RHSA-2011:0861-01 |
Summary: | The remote host is missing an update for the 'subversion'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'subversion' package(s) announced via the referenced advisory. Vulnerability Insight: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed requests submitted against the URL of a baselined resource. A malicious, remote user could use this flaw to cause the httpd process serving the request to crash. (CVE-2011-1752) Red Hat would like to thank the Apache Subversion project for reporting this issue. Upstream acknowledges Joe Schaefer of the Apache Software Foundation as the original reporter. All Subversion users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect. Affected Software/OS: subversion on Red Hat Enterprise Linux AS version 4, Red Hat Enterprise Linux ES version 4, Red Hat Enterprise Linux WS version 4 Solution: Please Install the Updated Packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1752 1025617 http://www.securitytracker.com/id?1025617 44633 http://secunia.com/advisories/44633 44681 http://secunia.com/advisories/44681 44849 http://secunia.com/advisories/44849 44879 http://secunia.com/advisories/44879 44888 http://secunia.com/advisories/44888 45162 http://secunia.com/advisories/45162 48091 http://www.securityfocus.com/bid/48091 APPLE-SA-2012-02-01-1 http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html DSA-2251 http://www.debian.org/security/2011/dsa-2251 FEDORA-2011-8341 http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html FEDORA-2011-8352 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html MDVSA-2011:106 http://www.mandriva.com/security/advisories?name=MDVSA-2011:106 RHSA-2011:0861 http://www.redhat.com/support/errata/RHSA-2011-0861.html RHSA-2011:0862 http://www.redhat.com/support/errata/RHSA-2011-0862.html USN-1144-1 http://www.ubuntu.com/usn/USN-1144-1 http://subversion.apache.org/security/CVE-2011-1752-advisory.txt http://support.apple.com/kb/HT5130 http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES https://bugzilla.redhat.com/show_bug.cgi?id=709111 oval:org.mitre.oval:def:18922 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922 |
Copyright | Copyright (C) 2011 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |