Lucene search

K
gentooGentoo FoundationGLSA-200908-05
HistoryAug 18, 2009 - 12:00 a.m.

Subversion: Remote execution of arbitrary code

2009-08-1800:00:00
Gentoo Foundation
security.gentoo.org
17

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%

Background

Subversion is a versioning system designed to be a replacement for CVS.

Description

Matt Lewis of Google reported multiple integer overflows in the libsvn_delta library, possibly leading to heap-based buffer overflows.

Impact

A remote attacker with commit access could exploit this vulnerability by sending a specially crafted commit to a Subversion server, or a remote attacker could entice a user to check out or update a repository from a malicious Subversion server, possibly resulting in the execution of arbitrary code with the privileges of the user running the server or client.

Workaround

There is no known workaround at this time.

Resolution

All Subversion users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-util/subversion-1.6.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-util/subversion<Β 1.6.4UNKNOWN

8.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

0.036 Low

EPSS

Percentile

91.6%