Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2017.3388.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3388-2)
Summary:The remote host is missing an update for the 'subversion' package(s) announced via the USN-3388-2 advisory.
Description:Summary:
The remote host is missing an update for the 'subversion' package(s) announced via the USN-3388-2 advisory.

Vulnerability Insight:
USN-3388-1 fixed several vulnerabilities in Subversion. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Ivan Zhakov discovered that Subversion did not properly handle
some requests. A remote attacker could use this to cause a
denial of service. (CVE-2016-2168)

Original advisory details:

Joern Schneeweisz discovered that Subversion did not properly handle
host names in 'svn+ssh://' URLs. A remote attacker could use this
to construct a subversion repository that when accessed could run
arbitrary code with the privileges of the user. (CVE-2017-9800)

Daniel Shahaf and James McCoy discovered that Subversion did not
properly verify realms when using Cyrus SASL authentication. A
remote attacker could use this to possibly bypass intended access
restrictions. (CVE-2016-2167)

Affected Software/OS:
'subversion' package(s) on Ubuntu 12.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-2167
BugTraq ID: 89417
http://www.securityfocus.com/bid/89417
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
Debian Security Information: DSA-3561 (Google Search)
http://www.debian.org/security/2016/dsa-3561
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
https://security.gentoo.org/glsa/201610-05
https://www.oracle.com/security-alerts/cpuoct2020.html
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E
http://www.securitytracker.com/id/1035706
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
SuSE Security Announcement: openSUSE-SU-2016:1263 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
SuSE Security Announcement: openSUSE-SU-2016:1264 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-2168
BugTraq ID: 89320
http://www.securityfocus.com/bid/89320
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
http://www.securitytracker.com/id/1035707
Common Vulnerability Exposure (CVE) ID: CVE-2017-9800
BugTraq ID: 100259
http://www.securityfocus.com/bid/100259
Bugtraq: 20170810 [SECURITY][ANNOUNCE] Apache Subversion 1.9.7 released (Google Search)
http://www.securityfocus.com/archive/1/540999/100/0/threaded
https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html
https://subversion.apache.org/security/CVE-2017-9800-advisory.txt
https://support.apple.com/HT208103
Debian Security Information: DSA-3932 (Google Search)
http://www.debian.org/security/2017/dsa-3932
https://security.gentoo.org/glsa/201709-09
http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html
https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76@%3Ccommits.subversion.apache.org%3E
RedHat Security Advisories: RHSA-2017:2480
https://access.redhat.com/errata/RHSA-2017:2480
http://www.securitytracker.com/id/1039127
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.