{"id": "SECURITYVULNS:DOC:25523", "bulletinFamily": "software", "title": "[ MDVSA-2011:006 ] subversion", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2011:006\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : subversion\r\n Date : January 14, 2011\r\n Affected: 2009.0, 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n Multiple vulnerabilities has been found and corrected in subversion:\r\n \r\n The walk function in repos.c in the mod_dav_svn module for the Apache\r\n HTTP Server, as distributed in Apache Subversion before 1.6.15,\r\n allows remote authenticated users to cause a denial of service (NULL\r\n pointer dereference and daemon crash) via vectors that trigger the\r\n walking of SVNParentPath collections (CVE-2010-4539).\r\n \r\n Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\r\n allow remote authenticated users to cause a denial of service (memory\r\n consumption and daemon crash) via the -g option to the blame command\r\n (CVE-2010-4644).\r\n \r\n Packages for 2009.0 are provided as of the Extended Maintenance\r\n Program. Please visit this link to learn more:\r\n http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490\r\n \r\n The updated packages have been upgraded to the latest versions (1.5.9,\r\n 1.6.15) which is not affected by these issues and in turn contains\r\n many bugfixes as well.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4539\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4644\r\n http://svn.apache.org/repos/asf/subversion/tags/1.5.9/CHANGES\r\n http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2009.0:\r\n 7a21abe39672c92b26412f3194d9c6ed \r\n2009.0/i586/apache-mod_dav_svn-1.5.9-0.1mdv2009.0.i586.rpm\r\n 88d9f13a4796fb8f6844ea62ebd5bd20 \r\n2009.0/i586/apache-mod_dontdothat-1.5.9-0.1mdv2009.0.i586.rpm\r\n 2612018face6868daea8ab73c095a94a 2009.0/i586/libsvn0-1.5.9-0.1mdv2009.0.i586.rpm\r\n d29c73930affdac3dd077d2c4376a077 \r\n2009.0/i586/libsvnjavahl0-1.5.9-0.1mdv2009.0.i586.rpm\r\n 9441d2fa1377b1ee460da526a6af69d3 2009.0/i586/perl-SVN-1.5.9-0.1mdv2009.0.i586.rpm\r\n d928aa58e55b57feb8d12ce39e481caa \r\n2009.0/i586/python-svn-1.5.9-0.1mdv2009.0.i586.rpm\r\n cc162406e599ed9975e476cac07b8865 2009.0/i586/ruby-svn-1.5.9-0.1mdv2009.0.i586.rpm\r\n cb405f4288955c82eeddda9713da6388 \r\n2009.0/i586/subversion-1.5.9-0.1mdv2009.0.i586.rpm\r\n 4085cc298f5a5744454eb7c1f9b3686b \r\n2009.0/i586/subversion-devel-1.5.9-0.1mdv2009.0.i586.rpm\r\n 107a4e0f87c447a01f70cb9ed10283de \r\n2009.0/i586/subversion-doc-1.5.9-0.1mdv2009.0.i586.rpm\r\n 435eb48eed3a4ee29f46dcb3c314cd12 \r\n2009.0/i586/subversion-server-1.5.9-0.1mdv2009.0.i586.rpm\r\n 16486815c3c4d6bceb0744dce94d5fd2 \r\n2009.0/i586/subversion-tools-1.5.9-0.1mdv2009.0.i586.rpm\r\n 2e5e0f4921c386b4033c4e102c71c2f9 \r\n2009.0/i586/svn-javahl-1.5.9-0.1mdv2009.0.i586.rpm \r\n 12120682cdf620fd0d480fb266c3e7f2 \r\n2009.0/SRPMS/subversion-1.5.9-0.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n d7a136acd449844ea429c0b5ad75326e \r\n2009.0/x86_64/apache-mod_dav_svn-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 85ae467d73ebe355aa2d18e27e262fe7 \r\n2009.0/x86_64/apache-mod_dontdothat-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 96d8e72a8b499ef5551f6156de0f0eb6 \r\n2009.0/x86_64/lib64svn0-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 46784e6046d8d2a0c970f8c2901a59d6 \r\n2009.0/x86_64/lib64svnjavahl0-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 906689050f8308cd4ead89dae25792cb \r\n2009.0/x86_64/perl-SVN-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n d0bb679d6ffa4bf4263f7418b7a3a893 \r\n2009.0/x86_64/python-svn-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 1b51eab2eec5ca7ac47adf6d1f2a059b \r\n2009.0/x86_64/ruby-svn-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 44276822239dd81c7f88e68e9c176867 \r\n2009.0/x86_64/subversion-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 86834e8f254935f6deda9060f582f3b2 \r\n2009.0/x86_64/subversion-devel-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 94e60bad3305f0f4835258623c52f9c6 \r\n2009.0/x86_64/subversion-doc-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 3d5aea7bb0c80f1118cdc5acdc1122c7 \r\n2009.0/x86_64/subversion-server-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n 4d8ef22cf96004e1f00e6f93a9f483fa \r\n2009.0/x86_64/subversion-tools-1.5.9-0.1mdv2009.0.x86_64.rpm\r\n fcf2fc1c15d17b3d34e3b11beba0b7a4 \r\n2009.0/x86_64/svn-javahl-1.5.9-0.1mdv2009.0.x86_64.rpm \r\n 12120682cdf620fd0d480fb266c3e7f2 \r\n2009.0/SRPMS/subversion-1.5.9-0.1mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2010.0:\r\n 9ce13f0b3cfc3970576c4b95325347ca \r\n2010.0/i586/apache-mod_dav_svn-1.6.15-0.1mdv2010.0.i586.rpm\r\n 49b626048b87824851c24bae3d6d85d4 \r\n2010.0/i586/apache-mod_dontdothat-1.6.15-0.1mdv2010.0.i586.rpm\r\n 7e605d5dd258ec3b4c3219d650ba3584 2010.0/i586/libsvn0-1.6.15-0.1mdv2010.0.i586.rpm\r\n bc1427f46567b23065061551e32c9884 \r\n2010.0/i586/libsvnjavahl1-1.6.15-0.1mdv2010.0.i586.rpm\r\n 4397c2a2670bfe9d64c2b19c48cf4b1c \r\n2010.0/i586/perl-SVN-1.6.15-0.1mdv2010.0.i586.rpm\r\n 36ede5f9b311e0b555158848e3ae6b77 \r\n2010.0/i586/python-svn-1.6.15-0.1mdv2010.0.i586.rpm\r\n bfb5c1ce016f5cc9276a59eb2193efb0 \r\n2010.0/i586/ruby-svn-1.6.15-0.1mdv2010.0.i586.rpm\r\n b88dbfd8558a44d51336fb69dac97ffc \r\n2010.0/i586/subversion-1.6.15-0.1mdv2010.0.i586.rpm\r\n be9bea3f9e80d9b889f324d5c41798f9 \r\n2010.0/i586/subversion-devel-1.6.15-0.1mdv2010.0.i586.rpm\r\n cc6df71b52ea803c8f6ca0e7dadc30c0 \r\n2010.0/i586/subversion-doc-1.6.15-0.1mdv2010.0.i586.rpm\r\n d1361618ec7f94b94ca3dba8f121d947 \r\n2010.0/i586/subversion-server-1.6.15-0.1mdv2010.0.i586.rpm\r\n baa2b15c5c5639c9af1990a08526d243 \r\n2010.0/i586/subversion-tools-1.6.15-0.1mdv2010.0.i586.rpm\r\n 0f875b126737242f2a2cc83e5700ad29 \r\n2010.0/i586/svn-javahl-1.6.15-0.1mdv2010.0.i586.rpm \r\n abc5d49701eefadb1bcd5da8e55e44f0 \r\n2010.0/SRPMS/subversion-1.6.15-0.1mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.0/X86_64:\r\n 3d5bb65838d6a3f9e761affd7e0d08e0 \r\n2010.0/x86_64/apache-mod_dav_svn-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 8d11e114439e373ffa0f2c64dd0be9d2 \r\n2010.0/x86_64/apache-mod_dontdothat-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 3dd0674c3bd2bcb28ea062a81947002c \r\n2010.0/x86_64/lib64svn0-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n c187178c9b1a8fd3b8c7682a8bd8d7d7 \r\n2010.0/x86_64/lib64svnjavahl1-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n c64c780b75d12bcbe9fa545048e8e23e \r\n2010.0/x86_64/perl-SVN-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n beb3af8cd75fa3863e1a4cccd3da21d0 \r\n2010.0/x86_64/python-svn-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 4478f77f42d3da219ea0f0313c7d7715 \r\n2010.0/x86_64/ruby-svn-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 5e72c7c914fe517904a4c830857ea796 \r\n2010.0/x86_64/subversion-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 30dbee2f306b8433e5e7a3f86707e825 \r\n2010.0/x86_64/subversion-devel-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 7bd341afd9291bf551af9384f210701b \r\n2010.0/x86_64/subversion-doc-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n 7448817aa3d256f222ca62f84805ed65 \r\n2010.0/x86_64/subversion-server-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n a21a4099430c3e5ef7347d92b376da63 \r\n2010.0/x86_64/subversion-tools-1.6.15-0.1mdv2010.0.x86_64.rpm\r\n d8e463e8860bd378fc26a99bd293c288 \r\n2010.0/x86_64/svn-javahl-1.6.15-0.1mdv2010.0.x86_64.rpm \r\n abc5d49701eefadb1bcd5da8e55e44f0 \r\n2010.0/SRPMS/subversion-1.6.15-0.1mdv2010.0.src.rpm\r\n\r\n Mandriva Linux 2010.1:\r\n dec5f80fbd38aa045cb4fd1be2b90eba \r\n2010.1/i586/apache-mod_dav_svn-1.6.15-0.1mdv2010.2.i586.rpm\r\n a1fcb5b25dd0f2f186c83d2643a5a421 \r\n2010.1/i586/apache-mod_dontdothat-1.6.15-0.1mdv2010.2.i586.rpm\r\n 83adff58142abffedeff301fff719404 2010.1/i586/libsvn0-1.6.15-0.1mdv2010.2.i586.rpm\r\n 7e01bae50f2ff7d4f8818fdac621c50d \r\n2010.1/i586/libsvn-gnome-keyring0-1.6.15-0.1mdv2010.2.i586.rpm\r\n ed1ce5cdd387ad6b20acdcd99d1a7961 \r\n2010.1/i586/libsvnjavahl1-1.6.15-0.1mdv2010.2.i586.rpm\r\n 998cf950719e3a0e777337ebc40102f9 \r\n2010.1/i586/libsvn-kwallet0-1.6.15-0.1mdv2010.2.i586.rpm\r\n a69224b4c28c61015b7d21496b80d33a \r\n2010.1/i586/perl-SVN-1.6.15-0.1mdv2010.2.i586.rpm\r\n 49b3c19b85b37d81ceef569b2e43d16d \r\n2010.1/i586/python-svn-1.6.15-0.1mdv2010.2.i586.rpm\r\n d92ce83e9d7e01b1cbaba9d738ca4e6f \r\n2010.1/i586/ruby-svn-1.6.15-0.1mdv2010.2.i586.rpm\r\n 166ff100673fcf341b5e585997e1a700 \r\n2010.1/i586/subversion-1.6.15-0.1mdv2010.2.i586.rpm\r\n a89fa806360ad34725768bb4df4daf34 \r\n2010.1/i586/subversion-devel-1.6.15-0.1mdv2010.2.i586.rpm\r\n 2cbc034899541e955af9992071f034e0 \r\n2010.1/i586/subversion-doc-1.6.15-0.1mdv2010.2.i586.rpm\r\n f9655b2f2a6c46a0d5ba11612e812509 \r\n2010.1/i586/subversion-server-1.6.15-0.1mdv2010.2.i586.rpm\r\n 4779985d0806ab357db6e18cf28ec066 \r\n2010.1/i586/subversion-tools-1.6.15-0.1mdv2010.2.i586.rpm\r\n 4c10038330a799797c7b15853917afc4 \r\n2010.1/i586/svn-javahl-1.6.15-0.1mdv2010.2.i586.rpm \r\n 87c317d227246d3fa6b1d4e6a190bf68 \r\n2010.1/SRPMS/subversion-1.6.15-0.1mdv2010.2.src.rpm\r\n\r\n Mandriva Linux 2010.1/X86_64:\r\n 03eb4b91fcdf875e337bed37864c7868 \r\n2010.1/x86_64/apache-mod_dav_svn-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n a1a3d1a4e31cb70b21efeb94d87543b8 \r\n2010.1/x86_64/apache-mod_dontdothat-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 3631948b49958ef80f8bd33bb752e744 \r\n2010.1/x86_64/lib64svn0-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 5717b0f23a1555e853cbe17225dab33a \r\n2010.1/x86_64/lib64svn-gnome-keyring0-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 6a96b30aca81da636cf8037081c30a88 \r\n2010.1/x86_64/lib64svnjavahl1-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 4c24e4c040aeb0387d19860389c5a55e \r\n2010.1/x86_64/lib64svn-kwallet0-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n b1b39710af773bf35bdf857b7e2b2864 \r\n2010.1/x86_64/perl-SVN-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 8d291663278076a00ee568f45b690453 \r\n2010.1/x86_64/python-svn-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n afd7024cd10cd5561d33ff5c4327de03 \r\n2010.1/x86_64/ruby-svn-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 5af5bf75ca0fa36c654caa163cca6b4a \r\n2010.1/x86_64/subversion-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 65745b82fe751ef8bf3b998c191375af \r\n2010.1/x86_64/subversion-devel-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 0da10e400f9f6bf0de1387f20e134246 \r\n2010.1/x86_64/subversion-doc-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 35eca9506902873eea3115a2db70b782 \r\n2010.1/x86_64/subversion-server-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n 85be106ec54a956213b5cf852af1e58f \r\n2010.1/x86_64/subversion-tools-1.6.15-0.1mdv2010.2.x86_64.rpm\r\n d59b917ac393a9ff4d7bf174fd4aa208 \r\n2010.1/x86_64/svn-javahl-1.6.15-0.1mdv2010.2.x86_64.rpm \r\n 87c317d227246d3fa6b1d4e6a190bf68 \r\n2010.1/SRPMS/subversion-1.6.15-0.1mdv2010.2.src.rpm\r\n\r\n Corporate 4.0:\r\n 8d2a19115be8823e248781274d75b3b1 \r\ncorporate/4.0/i586/apache-mod_dav_svn-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 1ed28041d41a5338921600ce7bfc3615 \r\ncorporate/4.0/i586/apache-mod_dontdothat-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 2037e925a9441e7728da60fcced77a27 \r\ncorporate/4.0/i586/libsvn0-1.5.9-0.1.20060mlcs4.i586.rpm\r\n b36d906936f99dc04feb3631d833cf00 \r\ncorporate/4.0/i586/perl-SVN-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 95f4238864604d37ef5b87d0bb596148 \r\ncorporate/4.0/i586/python-svn-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 117fe8ec98de938598452207efbf9fda \r\ncorporate/4.0/i586/subversion-1.5.9-0.1.20060mlcs4.i586.rpm\r\n c9a57efb99a653d384d54c68dce2f31a \r\ncorporate/4.0/i586/subversion-devel-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 74d8a9983f589f7635aa945fa25d91db \r\ncorporate/4.0/i586/subversion-doc-1.5.9-0.1.20060mlcs4.i586.rpm\r\n 0f70b51a0f89aa939a11e2f841dee673 \r\ncorporate/4.0/i586/subversion-server-1.5.9-0.1.20060mlcs4.i586.rpm\r\n f75a4d15d19709b807ce80b1ad3818e3 \r\ncorporate/4.0/i586/subversion-tools-1.5.9-0.1.20060mlcs4.i586.rpm \r\n 0f1f3c4ef39d08eebfa9f64a44fb8430 \r\ncorporate/4.0/SRPMS/subversion-1.5.9-0.1.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n ca039496647c64f860fe1e00aca44a5c \r\ncorporate/4.0/x86_64/apache-mod_dav_svn-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 10084212c7ff6b014f96077c55526723 \r\ncorporate/4.0/x86_64/apache-mod_dontdothat-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 1df7b077de771bff61dda880fc695af6 \r\ncorporate/4.0/x86_64/lib64svn0-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 0e82b7d932e1a8167808e388d34f791a \r\ncorporate/4.0/x86_64/perl-SVN-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 1b0a60dd681476cfc01a4cf210c32aca \r\ncorporate/4.0/x86_64/python-svn-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n f0146f8282a63d10541b33051a867ae8 \r\ncorporate/4.0/x86_64/subversion-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 9ad1915a11b53eee99882425c541d09f \r\ncorporate/4.0/x86_64/subversion-devel-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n f8eda6c300e58a4dbdf7591eb9e2f11e \r\ncorporate/4.0/x86_64/subversion-doc-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 431c6c3244a7fcf5d13fa6bba0819578 \r\ncorporate/4.0/x86_64/subversion-server-1.5.9-0.1.20060mlcs4.x86_64.rpm\r\n 4beb7b504c3967accfc9c1eb6fb404d8 \r\ncorporate/4.0/x86_64/subversion-tools-1.5.9-0.1.20060mlcs4.x86_64.rpm \r\n 0f1f3c4ef39d08eebfa9f64a44fb8430 \r\ncorporate/4.0/SRPMS/subversion-1.5.9-0.1.20060mlcs4.src.rpm\r\n\r\n Mandriva Enterprise Server 5:\r\n 7837b3a4791587e8c14ba2dae700207e \r\nmes5/i586/apache-mod_dav_svn-1.5.9-0.1mdvmes5.1.i586.rpm\r\n c192fa218ecd630de6f7498c190f38d5 \r\nmes5/i586/apache-mod_dontdothat-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 9d7cf69454418a603cdd4fc587854f77 mes5/i586/libsvn0-1.5.9-0.1mdvmes5.1.i586.rpm\r\n cffd8299ccf9d2023e8f18fbe6944842 \r\nmes5/i586/libsvnjavahl0-1.5.9-0.1mdvmes5.1.i586.rpm\r\n bd2daa779a85daee9dcd12f9db4e4031 mes5/i586/perl-SVN-1.5.9-0.1mdvmes5.1.i586.rpm\r\n a2eead888b2eee6909f4d06692c239f4 mes5/i586/python-svn-1.5.9-0.1mdvmes5.1.i586.rpm\r\n c588d994f22c4b7c8540ddeec6373200 mes5/i586/ruby-svn-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 2764276a059683df14352157c39b5069 mes5/i586/subversion-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 9c0f465b023769ac65321a8ebccedf79 \r\nmes5/i586/subversion-devel-1.5.9-0.1mdvmes5.1.i586.rpm\r\n d0136103d43b353ca80b5756a787b54d \r\nmes5/i586/subversion-doc-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 4b98c0cfaeb9434dc8b50b3ceed1a67f \r\nmes5/i586/subversion-server-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 971c676111ca2de221592eacfc380c13 \r\nmes5/i586/subversion-tools-1.5.9-0.1mdvmes5.1.i586.rpm\r\n 3b84f238fed19a6903b00aafa915ce46 \r\nmes5/i586/svn-javahl-1.5.9-0.1mdvmes5.1.i586.rpm \r\n 1d3fed3472ebde32e7d28f6163882121 mes5/SRPMS/subversion-1.5.9-0.1mdvmes5.1.src.rpm\r\n\r\n Mandriva Enterprise Server 5/X86_64:\r\n e70ade9cabb1516102bf31d5b445ce68 \r\nmes5/x86_64/apache-mod_dav_svn-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n f93218c1805aeba0b3ea1ad5c7781edc \r\nmes5/x86_64/apache-mod_dontdothat-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 100d3c8d9d3233794c069214284adad7 \r\nmes5/x86_64/lib64svn0-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 1fd063baf103593d07396f7f813ba1ca \r\nmes5/x86_64/lib64svnjavahl0-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n e513397cf9f57a998fef93c18f8b1c70 \r\nmes5/x86_64/perl-SVN-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 079208d3a916cb82e265017fe0d8d0fa \r\nmes5/x86_64/python-svn-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 037382a319e5b9dc8eeb96930605c903 \r\nmes5/x86_64/ruby-svn-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n e1ee4bee55ff9b45b71321168b3708c1 \r\nmes5/x86_64/subversion-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n eceee9441fb6a042162bd31d0ad5b61f \r\nmes5/x86_64/subversion-devel-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 7fca4a0c543e1a78359a21e41326a30d \r\nmes5/x86_64/subversion-doc-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n d522020b6bf337f4f91577d223c2df0e \r\nmes5/x86_64/subversion-server-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 2e46e9c51ba24b6dddc19bb8a9c43bf7 \r\nmes5/x86_64/subversion-tools-1.5.9-0.1mdvmes5.1.x86_64.rpm\r\n 699f68f6303db0104e2841ade7388f68 \r\nmes5/x86_64/svn-javahl-1.5.9-0.1mdvmes5.1.x86_64.rpm \r\n 1d3fed3472ebde32e7d28f6163882121 mes5/SRPMS/subversion-1.5.9-0.1mdvmes5.1.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFNMCXxmqjQ0CJFipgRAj6fAJ93P2E0ZwS/Xu0HEgQp0AH5t2HFfgCdEOyQ\r\ngkhTTXZIVuNisPBYGG9BQsY=\r\n=UUY3\r\n-----END PGP SIGNATURE-----", "published": "2011-01-20T00:00:00", "modified": "2011-01-20T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:25523", "reporter": "Securityvulns", "references": [], "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "type": "securityvulns", "lastseen": "2018-08-31T11:10:38", "edition": 1, "viewCount": 19, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}, "dependencies": {"references": [{"type": "centos", "idList": ["CESA-2011:0257"]}, {"type": "cve", "idList": ["CVE-2010-4539", "CVE-2010-4644"]}, {"type": "debian", "idList": ["DEBIAN:BSA-017:CAAB8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2010-4539", "DEBIANCVE:CVE-2010-4644"]}, {"type": "fedora", "idList": ["FEDORA:AEED9110D35"]}, {"type": "freebsd", "idList": ["71612099-1E93-11E0-A587-001B77D09812"]}, {"type": "gentoo", "idList": ["GLSA-201309-11"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2011-0257.NASL", "FEDORA_2011-0099.NASL", "FREEBSD_PKG_716120991E9311E0A587001B77D09812.NASL", "GENTOO_GLSA-201309-11.NASL", "MANDRIVA_MDVSA-2011-006.NASL", "ORACLELINUX_ELSA-2011-0257.NASL", "ORACLELINUX_ELSA-2011-0258.NASL", "REDHAT-RHSA-2011-0257.NASL", "REDHAT-RHSA-2011-0258.NASL", "SL_20110215_SUBVERSION_ON_SL5_X.NASL", "SL_20110215_SUBVERSION_ON_SL6_X.NASL", "SUSE_11_2_LIBSVN_AUTH_GNOME_KEYRING-1-0-110119.NASL", "SUSE_11_3_LIBSVN_AUTH_GNOME_KEYRING-1-0-110119.NASL", "SUSE_CVS2SVN-7319.NASL", "UBUNTU_USN-1053-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310121025", "OPENVAS:1361412562310122241", "OPENVAS:1361412562310122243", "OPENVAS:136141256231068819", "OPENVAS:1361412562310831306", "OPENVAS:1361412562310840580", "OPENVAS:1361412562310862797", "OPENVAS:1361412562310870397", "OPENVAS:1361412562310870654", "OPENVAS:1361412562310880558", "OPENVAS:1361412562310881320", "OPENVAS:68819", "OPENVAS:831306", "OPENVAS:840580", "OPENVAS:862797", "OPENVAS:870397", "OPENVAS:870654", "OPENVAS:880558", "OPENVAS:881320"]}, {"type": "oraclelinux", "idList": ["ELSA-2011-0257", "ELSA-2011-0258"]}, {"type": "redhat", "idList": ["RHSA-2011:0257", "RHSA-2011:0258"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:11366"]}, {"type": "ubuntu", "idList": ["USN-1053-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2010-4539", "UB:CVE-2010-4644"]}, {"type": "veracode", "idList": ["VERACODE:24406", "VERACODE:24407"]}]}, "backreferences": {"references": [{"type": "centos", "idList": ["CESA-2011:0257"]}, {"type": "cve", "idList": ["CVE-2010-4539", "CVE-2010-4644"]}, {"type": "debian", "idList": ["DEBIAN:BSA-017:CAAB8"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2010-4539"]}, {"type": "fedora", "idList": ["FEDORA:AEED9110D35"]}, {"type": "freebsd", "idList": ["71612099-1E93-11E0-A587-001B77D09812"]}, {"type": "gentoo", "idList": ["GLSA-201309-11"]}, {"type": "nessus", "idList": ["FREEBSD_PKG_716120991E9311E0A587001B77D09812.NASL", "ORACLELINUX_ELSA-2011-0257.NASL", "SUSE_CVS2SVN-7319.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310122241"]}, {"type": "oraclelinux", "idList": ["ELSA-2011-0257"]}, {"type": "redhat", "idList": ["RHSA-2011:0257"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2010-4644"]}]}, "exploitation": null, "vulnersScore": 2.1}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660012827, "score": 1659891395}, "_internal": {"score_hash": "1ce055db3590930bb8a0f62d02039deb"}}
{"nessus": [{"lastseen": "2021-08-19T12:49:53", "description": "The subversion server could be crashed by clients inside SVNParentPath(). Additionally an Out Of Memory condition via 'blame\n-g' has been fixed. CVE-2010-4539 and CVE-2010-4644 have been assigned to these issues.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0136-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0", "p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0", "p-cpe:/a:novell:opensuse:subversion", "p-cpe:/a:novell:opensuse:subversion-devel", "p-cpe:/a:novell:opensuse:subversion-perl", "p-cpe:/a:novell:opensuse:subversion-python", "p-cpe:/a:novell:opensuse:subversion-ruby", "p-cpe:/a:novell:opensuse:subversion-server", "p-cpe:/a:novell:opensuse:subversion-tools", "cpe:/o:novell:opensuse:11.3"], "id": "SUSE_11_3_LIBSVN_AUTH_GNOME_KEYRING-1-0-110119.NASL", "href": "https://www.tenable.com/plugins/nessus/75616", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libsvn_auth_gnome_keyring-1-0-3835.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75616);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n\n script_name(english:\"openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0136-1)\");\n script_summary(english:\"Check for the libsvn_auth_gnome_keyring-1-0-3835 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The subversion server could be crashed by clients inside\nSVNParentPath(). Additionally an Out Of Memory condition via 'blame\n-g' has been fixed. CVE-2010-4539 and CVE-2010-4644 have been assigned\nto these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=662030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-02/msg00017.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libsvn_auth_gnome_keyring-1-0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libsvn_auth_gnome_keyring-1-0-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"libsvn_auth_kwallet-1-0-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-devel-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-perl-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-python-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-ruby-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-server-1.6.9-4.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"subversion-tools-1.6.9-4.5.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"subversion\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:51", "description": "Multiple vulnerabilities has been found and corrected in subversion :\n\nThe walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections (CVE-2010-4539).\n\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command (CVE-2010-4644).\n\nPackages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been upgraded to the latest versions (1.5.9, 1.6.15) which is not affected by these issues and in turn contains many bugfixes as well.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-28T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : subversion (MDVSA-2011:006)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:apache-mod_dav_svn", "p-cpe:/a:mandriva:linux:apache-mod_dontdothat", "p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0", "p-cpe:/a:mandriva:linux:lib64svn-kwallet0", "p-cpe:/a:mandriva:linux:lib64svn0", "p-cpe:/a:mandriva:linux:lib64svnjavahl0", "p-cpe:/a:mandriva:linux:lib64svnjavahl1", "p-cpe:/a:mandriva:linux:libsvn-gnome-keyring0", "p-cpe:/a:mandriva:linux:libsvn-kwallet0", "p-cpe:/a:mandriva:linux:libsvn0", "p-cpe:/a:mandriva:linux:libsvnjavahl0", "p-cpe:/a:mandriva:linux:libsvnjavahl1", "p-cpe:/a:mandriva:linux:perl-SVN", "p-cpe:/a:mandriva:linux:python-svn", "p-cpe:/a:mandriva:linux:ruby-svn", "p-cpe:/a:mandriva:linux:subversion", "p-cpe:/a:mandriva:linux:subversion-devel", "p-cpe:/a:mandriva:linux:subversion-doc", "p-cpe:/a:mandriva:linux:subversion-server", "p-cpe:/a:mandriva:linux:subversion-tools", "p-cpe:/a:mandriva:linux:svn-javahl", "cpe:/o:mandriva:linux:2009.0", "cpe:/o:mandriva:linux:2010.0", "cpe:/o:mandriva:linux:2010.1"], "id": "MANDRIVA_MDVSA-2011-006.NASL", "href": "https://www.tenable.com/plugins/nessus/51798", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2011:006. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51798);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_xref(name:\"MDVSA\", value:\"2011:006\");\n\n script_name(english:\"Mandriva Linux Security Advisory : subversion (MDVSA-2011:006)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple vulnerabilities has been found and corrected in subversion :\n\nThe walk function in repos.c in the mod_dav_svn module for the Apache\nHTTP Server, as distributed in Apache Subversion before 1.6.15, allows\nremote authenticated users to cause a denial of service (NULL pointer\ndereference and daemon crash) via vectors that trigger the walking of\nSVNParentPath collections (CVE-2010-4539).\n\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\nallow remote authenticated users to cause a denial of service (memory\nconsumption and daemon crash) via the -g option to the blame command\n(CVE-2010-4644).\n\nPackages for 2009.0 are provided as of the Extended Maintenance\nProgram. Please visit this link to learn more:\nhttp://store.mandriva.com/product_info.php?cPath=149 products_id=490\n\nThe updated packages have been upgraded to the latest versions (1.5.9,\n1.6.15) which is not affected by these issues and in turn contains\nmany bugfixes as well.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://svn.apache.org/repos/asf/subversion/tags/1.5.9/CHANGES\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:apache-mod_dontdothat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64svn-kwallet0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64svn0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64svnjavahl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64svnjavahl1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsvn-gnome-keyring0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsvn-kwallet0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsvn0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsvnjavahl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libsvnjavahl1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:perl-SVN\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:python-svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:ruby-svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:subversion-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:subversion-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:subversion-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:svn-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2009.0\", reference:\"apache-mod_dav_svn-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"apache-mod_dontdothat-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64svn0-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64svnjavahl0-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libsvn0-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libsvnjavahl0-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"perl-SVN-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"python-svn-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"ruby-svn-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"subversion-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"subversion-devel-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"subversion-doc-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"subversion-server-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"subversion-tools-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"svn-javahl-1.5.9-0.1mdv2009.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.0\", reference:\"apache-mod_dav_svn-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"apache-mod_dontdothat-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64svn0-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"x86_64\", reference:\"lib64svnjavahl1-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libsvn0-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", cpu:\"i386\", reference:\"libsvnjavahl1-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"perl-SVN-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"python-svn-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"ruby-svn-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"subversion-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"subversion-devel-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"subversion-doc-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"subversion-server-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"subversion-tools-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.0\", reference:\"svn-javahl-1.6.15-0.1mdv2010.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2010.1\", reference:\"apache-mod_dav_svn-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"apache-mod_dontdothat-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64svn-gnome-keyring0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64svn-kwallet0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64svn0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"x86_64\", reference:\"lib64svnjavahl1-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libsvn-gnome-keyring0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libsvn-kwallet0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libsvn0-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", cpu:\"i386\", reference:\"libsvnjavahl1-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"perl-SVN-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"python-svn-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"ruby-svn-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"subversion-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"subversion-devel-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"subversion-doc-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"subversion-server-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"subversion-tools-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"svn-javahl-1.6.15-0.1mdv2010.2\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:09", "description": "The subversion server could be crashed by clients inside SVNParentPath(). Additionally an Out Of Memory condition via 'blame\n-g' has been fixed. CVE-2010-4539 and CVE-2010-4644 have been assigned to these issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-05-05T00:00:00", "type": "nessus", "title": "openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0136-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0", "p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0", "p-cpe:/a:novell:opensuse:subversion", "p-cpe:/a:novell:opensuse:subversion-devel", "p-cpe:/a:novell:opensuse:subversion-perl", "p-cpe:/a:novell:opensuse:subversion-python", "p-cpe:/a:novell:opensuse:subversion-ruby", "p-cpe:/a:novell:opensuse:subversion-server", "p-cpe:/a:novell:opensuse:subversion-tools", "cpe:/o:novell:opensuse:11.2"], "id": "SUSE_11_2_LIBSVN_AUTH_GNOME_KEYRING-1-0-110119.NASL", "href": "https://www.tenable.com/plugins/nessus/53759", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update libsvn_auth_gnome_keyring-1-0-3835.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53759);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n\n script_name(english:\"openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0136-1)\");\n script_summary(english:\"Check for the libsvn_auth_gnome_keyring-1-0-3835 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The subversion server could be crashed by clients inside\nSVNParentPath(). Additionally an Out Of Memory condition via 'blame\n-g' has been fixed. CVE-2010-4539 and CVE-2010-4644 have been assigned\nto these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=662030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-02/msg00017.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libsvn_auth_gnome_keyring-1-0 packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:subversion-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/05/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libsvn_auth_gnome_keyring-1-0-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"libsvn_auth_kwallet-1-0-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-devel-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-perl-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-python-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-ruby-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-server-1.6.6-1.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.2\", reference:\"subversion-tools-1.6.6-1.5.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"subversion\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:48", "description": "Updated subversion packages that fix two security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module (for use with the Apache HTTP Server) processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2011-02-16T00:00:00", "type": "nessus", "title": "RHEL 5 : subversion (RHSA-2011:0257)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mod_dav_svn", "p-cpe:/a:redhat:enterprise_linux:subversion", "p-cpe:/a:redhat:enterprise_linux:subversion-devel", "p-cpe:/a:redhat:enterprise_linux:subversion-javahl", "p-cpe:/a:redhat:enterprise_linux:subversion-perl", "p-cpe:/a:redhat:enterprise_linux:subversion-ruby", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:5.6"], "id": "REDHAT-RHSA-2011-0257.NASL", "href": "https://www.tenable.com/plugins/nessus/51994", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0257. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51994);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_xref(name:\"RHSA\", value:\"2011:0257\");\n\n script_name(english:\"RHEL 5 : subversion (RHSA-2011:0257)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated subversion packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables\none or more users to collaborate in developing and maintaining a\nhierarchy of files and directories while keeping a history of all\nchanges.\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule (for use with the Apache HTTP Server) processed certain\nrequests. If a malicious, remote user issued a certain type of request\nto display a collection of Subversion repositories on a host that has\nthe SVNListParentPath directive enabled, it could cause the httpd\nprocess serving the request to crash. Note that SVNListParentPath is\nnot enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe updated packages, the Subversion server must be restarted for the\nupdate to take effect: restart httpd if you are using mod_dav_svn, or\nrestart svnserve if it is used.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4644\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:0257\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:0257\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"subversion-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"subversion-devel-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_dav_svn / subversion / subversion-devel / subversion-javahl / etc\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:51", "description": "Entry for CVE-2010-4539 says :\n\nThe walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.\n\nEntry for CVE-2010-4644 says :\n\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-14T00:00:00", "type": "nessus", "title": "FreeBSD : subversion -- multiple DoS (71612099-1e93-11e0-a587-001b77d09812)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:subversion", "p-cpe:/a:freebsd:freebsd:subversion-freebsd", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_716120991E9311E0A587001B77D09812.NASL", "href": "https://www.tenable.com/plugins/nessus/51520", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51520);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n\n script_name(english:\"FreeBSD : subversion -- multiple DoS (71612099-1e93-11e0-a587-001b77d09812)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Entry for CVE-2010-4539 says :\n\nThe walk function in repos.c in the mod_dav_svn module for the Apache\nHTTP Server, as distributed in Apache Subversion before 1.6.15, allows\nremote authenticated users to cause a denial of service (NULL pointer\ndereference and daemon crash) via vectors that trigger the walking of\nSVNParentPath collections.\n\nEntry for CVE-2010-4644 says :\n\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\nallow remote authenticated users to cause a denial of service (memory\nconsumption and daemon crash) via the -g option to the blame command.\"\n );\n # https://vuxml.freebsd.org/freebsd/71612099-1e93-11e0-a587-001b77d09812.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d3afdeb4\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:subversion-freebsd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"subversion<1.6.15\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"subversion-freebsd<1.6.15\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:57", "description": "This release includes the latest Subversion release, fixing several bugs :\n\n - improve svnsync handling of dir copies\n\n - hide unreadable dirs in mod_dav_svn's GET response\n\n - make 'svnmucc propsetf' actually work\n\n - limit memory fragmentation in svnserve\n\n - fix 'svn export' regression from 1.6.13\n\n - fix 'svn export' mistakenly uri-encodes paths\n\n - fix server-side memory leaks triggered by 'blame -g'\n\n - prevent crash in mod_dav_svn when using SVNParentPath\n\n - allow 'log -g' to continue in the face of invalid mergeinfo\n\n - filter unreadable paths for 'svn ls' and 'svn co'\n\n - fix abort in 'svn blame -g'\n\n - fix file handle leak in ruby bindings\n\n - remove check for 1.7-style working copies\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-01-19T00:00:00", "type": "nessus", "title": "Fedora 14 : subversion-1.6.15-1.fc14 (2011-0099)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:subversion", "cpe:/o:fedoraproject:fedora:14"], "id": "FEDORA_2011-0099.NASL", "href": "https://www.tenable.com/plugins/nessus/51565", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2011-0099.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51565);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_xref(name:\"FEDORA\", value:\"2011-0099\");\n\n script_name(english:\"Fedora 14 : subversion-1.6.15-1.fc14 (2011-0099)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This release includes the latest Subversion release, fixing several\nbugs :\n\n - improve svnsync handling of dir copies\n\n - hide unreadable dirs in mod_dav_svn's GET response\n\n - make 'svnmucc propsetf' actually work\n\n - limit memory fragmentation in svnserve\n\n - fix 'svn export' regression from 1.6.13\n\n - fix 'svn export' mistakenly uri-encodes paths\n\n - fix server-side memory leaks triggered by 'blame -g'\n\n - prevent crash in mod_dav_svn when using SVNParentPath\n\n - allow 'log -g' to continue in the face of invalid\n mergeinfo\n\n - filter unreadable paths for 'svn ls' and 'svn co'\n\n - fix abort in 'svn blame -g'\n\n - fix file handle leak in ruby bindings\n\n - remove check for 1.7-style working copies\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=667407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=667763\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?502cf53c\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected subversion package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:14\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/19\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^14([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 14.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC14\", reference:\"subversion-1.6.15-1.fc14\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"subversion\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:07", "description": "Updated subversion packages that fix two security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module (for use with the Apache HTTP Server) processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2011-04-15T00:00:00", "type": "nessus", "title": "CentOS 5 : subversion (CESA-2011:0257)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:mod_dav_svn", "p-cpe:/a:centos:centos:subversion", "p-cpe:/a:centos:centos:subversion-devel", "p-cpe:/a:centos:centos:subversion-javahl", "p-cpe:/a:centos:centos:subversion-perl", "p-cpe:/a:centos:centos:subversion-ruby", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2011-0257.NASL", "href": "https://www.tenable.com/plugins/nessus/53420", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0257 and \n# CentOS Errata and Security Advisory 2011:0257 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(53420);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_xref(name:\"RHSA\", value:\"2011:0257\");\n\n script_name(english:\"CentOS 5 : subversion (CESA-2011:0257)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated subversion packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables\none or more users to collaborate in developing and maintaining a\nhierarchy of files and directories while keeping a history of all\nchanges.\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule (for use with the Apache HTTP Server) processed certain\nrequests. If a malicious, remote user issued a certain type of request\nto display a collection of Subversion repositories on a host that has\nthe SVNListParentPath directive enabled, it could cause the httpd\nprocess serving the request to crash. Note that SVNListParentPath is\nnot enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe updated packages, the Subversion server must be restarted for the\nupdate to take effect: restart httpd if you are using mod_dav_svn, or\nrestart svnserve if it is used.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-April/017285.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ac08c320\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-April/017287.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6909adfd\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected subversion packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:subversion-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/04/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/04/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"subversion-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"subversion-devel-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_dav_svn / subversion / subversion-devel / subversion-javahl / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:54:07", "description": "From Red Hat Security Advisory 2011:0257 :\n\nUpdated subversion packages that fix two security issues are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module (for use with the Apache HTTP Server) processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 5 : subversion (ELSA-2011-0257)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mod_dav_svn", "p-cpe:/a:oracle:linux:subversion", "p-cpe:/a:oracle:linux:subversion-devel", "p-cpe:/a:oracle:linux:subversion-javahl", "p-cpe:/a:oracle:linux:subversion-perl", "p-cpe:/a:oracle:linux:subversion-ruby", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2011-0257.NASL", "href": "https://www.tenable.com/plugins/nessus/68199", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2011:0257 and \n# Oracle Linux Security Advisory ELSA-2011-0257 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68199);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_xref(name:\"RHSA\", value:\"2011:0257\");\n\n script_name(english:\"Oracle Linux 5 : subversion (ELSA-2011-0257)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2011:0257 :\n\nUpdated subversion packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables\none or more users to collaborate in developing and maintaining a\nhierarchy of files and directories while keeping a history of all\nchanges.\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule (for use with the Apache HTTP Server) processed certain\nrequests. If a malicious, remote user issued a certain type of request\nto display a collection of Subversion repositories on a host that has\nthe SVNListParentPath directive enabled, it could cause the httpd\nprocess serving the request to crash. Note that SVNListParentPath is\nnot enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe updated packages, the Subversion server must be restarted for the\nupdate to take effect: restart httpd if you are using mod_dav_svn, or\nrestart svnserve if it is used.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-February/001823.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected subversion packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/01/07\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"subversion-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"subversion-devel-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_dav_svn / subversion / subversion-devel / subversion-javahl / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:57:32", "description": "A server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module (for use with the Apache HTTP Server) processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default. (CVE-2010-4539)\n\nAfter installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : subversion on SL5.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20110215_SUBVERSION_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60954", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60954);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n\n script_name(english:\"Scientific Linux Security Update : subversion on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule (for use with the Apache HTTP Server) processed certain\nrequests. If a malicious, remote user issued a certain type of request\nto display a collection of Subversion repositories on a host that has\nthe SVNListParentPath directive enabled, it could cause the httpd\nprocess serving the request to crash. Note that SVNListParentPath is\nnot enabled by default. (CVE-2010-4539)\n\nAfter installing the updated packages, the Subversion server must be\nrestarted for the update to take effect: restart httpd if you are\nusing mod_dav_svn, or restart svnserve if it is used.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1102&L=scientific-linux-errata&T=0&P=1243\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e4a84f3d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"mod_dav_svn-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"subversion-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"subversion-devel-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"subversion-javahl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"subversion-perl-1.6.11-7.el5_6.1\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"subversion-ruby-1.6.11-7.el5_6.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:57:58", "description": "An access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain access rules were not enforced, possibly allowing sensitive repository data to be leaked to remote users. Note that SVNPathAuthz is set to 'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAfter installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : subversion on SL6.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3315", "CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20110215_SUBVERSION_ON_SL6_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60955", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60955);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n\n script_name(english:\"Scientific Linux Security Update : subversion on SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain\naccess rules were not enforced, possibly allowing sensitive repository\ndata to be leaked to remote users. Note that SVNPathAuthz is set to\n'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule processed certain requests. If a malicious, remote user issued\na certain type of request to display a collection of Subversion\nrepositories on a host that has the SVNListParentPath directive\nenabled, it could cause the httpd process serving the request to\ncrash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAfter installing the updated packages, the Subversion server must be\nrestarted for the update to take effect: restart httpd if you are\nusing mod_dav_svn, or restart svnserve if it is used.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1103&L=scientific-linux-errata&T=0&P=5160\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f86c1ee8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL6\", reference:\"mod_dav_svn-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-devel-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-gnome-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-javahl-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-kde-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-perl-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-ruby-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"subversion-svn2cl-1.6.11-2.el6_0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:54:15", "description": "From Red Hat Security Advisory 2011:0258 :\n\nUpdated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP.\n\nAn access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain access rules were not enforced, possibly allowing sensitive repository data to be leaked to remote users. Note that SVNPathAuthz is set to 'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 6 : subversion (ELSA-2011-0258)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3315", "CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:mod_dav_svn", "p-cpe:/a:oracle:linux:subversion", "p-cpe:/a:oracle:linux:subversion-devel", "p-cpe:/a:oracle:linux:subversion-gnome", "p-cpe:/a:oracle:linux:subversion-javahl", "p-cpe:/a:oracle:linux:subversion-kde", "p-cpe:/a:oracle:linux:subversion-perl", "p-cpe:/a:oracle:linux:subversion-ruby", "p-cpe:/a:oracle:linux:subversion-svn2cl", "cpe:/o:oracle:linux:6"], "id": "ORACLELINUX_ELSA-2011-0258.NASL", "href": "https://www.tenable.com/plugins/nessus/68200", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2011:0258 and \n# Oracle Linux Security Advisory ELSA-2011-0258 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68200);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(43678, 45655);\n script_xref(name:\"RHSA\", value:\"2011:0258\");\n\n script_name(english:\"Oracle Linux 6 : subversion (ELSA-2011-0258)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2011:0258 :\n\nUpdated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables\none or more users to collaborate in developing and maintaining a\nhierarchy of files and directories while keeping a history of all\nchanges. The mod_dav_svn module is used with the Apache HTTP Server to\nallow access to Subversion repositories via HTTP.\n\nAn access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain\naccess rules were not enforced, possibly allowing sensitive repository\ndata to be leaked to remote users. Note that SVNPathAuthz is set to\n'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule processed certain requests. If a malicious, remote user issued\na certain type of request to display a collection of Subversion\nrepositories on a host that has the SVNListParentPath directive\nenabled, it could cause the httpd process serving the request to\ncrash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe updated packages, the Subversion server must be restarted for the\nupdate to take effect: restart httpd if you are using mod_dav_svn, or\nrestart svnserve if it is used.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-February/001883.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected subversion packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:subversion-svn2cl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"mod_dav_svn-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-devel-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-gnome-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-javahl-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-kde-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-perl-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-ruby-1.6.11-2.el6_0.2\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"subversion-svn2cl-1.6.11-2.el6_0.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:40", "description": "Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP.\n\nAn access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain access rules were not enforced, possibly allowing sensitive repository data to be leaked to remote users. Note that SVNPathAuthz is set to 'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a malicious, remote user performed 'svn blame' or 'svn log' operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.", "cvss3": {"score": null, "vector": null}, "published": "2011-02-16T00:00:00", "type": "nessus", "title": "RHEL 6 : subversion (RHSA-2011:0258)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3315", "CVE-2010-4539", "CVE-2010-4644"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:mod_dav_svn", "p-cpe:/a:redhat:enterprise_linux:subversion", "p-cpe:/a:redhat:enterprise_linux:subversion-debuginfo", "p-cpe:/a:redhat:enterprise_linux:subversion-devel", "p-cpe:/a:redhat:enterprise_linux:subversion-gnome", "p-cpe:/a:redhat:enterprise_linux:subversion-javahl", "p-cpe:/a:redhat:enterprise_linux:subversion-kde", "p-cpe:/a:redhat:enterprise_linux:subversion-perl", "p-cpe:/a:redhat:enterprise_linux:subversion-ruby", "p-cpe:/a:redhat:enterprise_linux:subversion-svn2cl", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "REDHAT-RHSA-2011-0258.NASL", "href": "https://www.tenable.com/plugins/nessus/51995", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:0258. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(51995);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(43678, 45655);\n script_xref(name:\"RHSA\", value:\"2011:0258\");\n\n script_name(english:\"RHEL 6 : subversion (RHSA-2011:0258)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated subversion packages that fix three security issues are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nSubversion (SVN) is a concurrent version control system which enables\none or more users to collaborate in developing and maintaining a\nhierarchy of files and directories while keeping a history of all\nchanges. The mod_dav_svn module is used with the Apache HTTP Server to\nallow access to Subversion repositories via HTTP.\n\nAn access restriction bypass flaw was found in the mod_dav_svn module.\nIf the SVNPathAuthz directive was set to 'short_circuit', certain\naccess rules were not enforced, possibly allowing sensitive repository\ndata to be leaked to remote users. Note that SVNPathAuthz is set to\n'On' by default. (CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed 'svn blame' or 'svn log' operations\non certain repository files, it could cause the Subversion server to\nconsume a large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn\nmodule processed certain requests. If a malicious, remote user issued\na certain type of request to display a collection of Subversion\nrepositories on a host that has the SVNListParentPath directive\nenabled, it could cause the httpd process serving the request to\ncrash. Note that SVNListParentPath is not enabled by default.\n(CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe updated packages, the Subversion server must be restarted for the\nupdate to take effect: restart httpd if you are using mod_dav_svn, or\nrestart svnserve if it is used.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-3315\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4539\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-4644\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:0258\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:mod_dav_svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:subversion-svn2cl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/10/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:0258\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"mod_dav_svn-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"mod_dav_svn-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"mod_dav_svn-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-debuginfo-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-devel-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-gnome-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-javahl-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-kde-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-perl-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-ruby-1.6.11-2.el6_0.2\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"subversion-svn2cl-1.6.11-2.el6_0.2\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:54", "description": "It was discovered that Subversion incorrectly handled certain 'partial access' privileges in rare scenarios. Remote authenticated users could use this flaw to obtain sensitive information (revision properties).\nThis issue only applied to Ubuntu 6.06 LTS. (CVE-2007-2448)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache did not properly handle a named repository as a rule scope. Remote authenticated users could use this flaw to bypass intended restrictions. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-3315)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache incorrectly handled the walk function. Remote authenticated users could use this flaw to cause the service to crash, leading to a denial of service. (CVE-2010-4539)\n\nIt was discovered that Subversion incorrectly handled certain memory operations. Remote authenticated users could use this flaw to consume large quantities of memory and cause the service to crash, leading to a denial of service. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-4644).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2011-02-02T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : subversion vulnerabilities (USN-1053-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-2448", "CVE-2010-3315", "CVE-2010-4539", "CVE-2010-4644"], "modified": "2019-09-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libapache2-svn", "p-cpe:/a:canonical:ubuntu_linux:libsvn-core-perl", "p-cpe:/a:canonical:ubuntu_linux:libsvn-dev", "p-cpe:/a:canonical:ubuntu_linux:libsvn-doc", "p-cpe:/a:canonical:ubuntu_linux:libsvn-java", "p-cpe:/a:canonical:ubuntu_linux:libsvn-javahl", "p-cpe:/a:canonical:ubuntu_linux:libsvn-perl", "p-cpe:/a:canonical:ubuntu_linux:libsvn-ruby", "p-cpe:/a:canonical:ubuntu_linux:libsvn-ruby1.8", "p-cpe:/a:canonical:ubuntu_linux:libsvn0", "p-cpe:/a:canonical:ubuntu_linux:libsvn0-dev", "p-cpe:/a:canonical:ubuntu_linux:libsvn1", "p-cpe:/a:canonical:ubuntu_linux:python-subversion", "p-cpe:/a:canonical:ubuntu_linux:python-subversion-dbg", "p-cpe:/a:canonical:ubuntu_linux:python2.4-subversion", "p-cpe:/a:canonical:ubuntu_linux:subversion", "p-cpe:/a:canonical:ubuntu_linux:subversion-tools", "cpe:/o:canonical:ubuntu_linux:10.04:-:lts", "cpe:/o:canonical:ubuntu_linux:10.10", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "cpe:/o:canonical:ubuntu_linux:8.04:-:lts", "cpe:/o:canonical:ubuntu_linux:9.10"], "id": "UBUNTU_USN-1053-1.NASL", "href": "https://www.tenable.com/plugins/nessus/51846", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-1053-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(51846);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/09/19 12:54:26\");\n\n script_cve_id(\"CVE-2007-2448\", \"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_xref(name:\"USN\", value:\"1053-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : subversion vulnerabilities (USN-1053-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that Subversion incorrectly handled certain 'partial\naccess' privileges in rare scenarios. Remote authenticated users could\nuse this flaw to obtain sensitive information (revision properties).\nThis issue only applied to Ubuntu 6.06 LTS. (CVE-2007-2448)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache\ndid not properly handle a named repository as a rule scope. Remote\nauthenticated users could use this flaw to bypass intended\nrestrictions. This issue only applied to Ubuntu 9.10, 10.04 LTS, and\n10.10. (CVE-2010-3315)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache\nincorrectly handled the walk function. Remote authenticated users\ncould use this flaw to cause the service to crash, leading to a denial\nof service. (CVE-2010-4539)\n\nIt was discovered that Subversion incorrectly handled certain memory\noperations. Remote authenticated users could use this flaw to consume\nlarge quantities of memory and cause the service to crash, leading to\na denial of service. This issue only applied to Ubuntu 9.10, 10.04\nLTS, and 10.10. (CVE-2010-4644).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/1053-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libapache2-svn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-core-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-javahl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn-ruby1.8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn0-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libsvn1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python-subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python-subversion-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:python2.4-subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:subversion-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:10.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:8.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:9.10\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/06/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/02/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/02/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(6\\.06|8\\.04|9\\.10|10\\.04|10\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 8.04 / 9.10 / 10.04 / 10.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libapache2-svn\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn-core-perl\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn-doc\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn-javahl\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn-ruby\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn-ruby1.8\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn0\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libsvn0-dev\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"python-subversion\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"python2.4-subversion\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"subversion\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"subversion-tools\", pkgver:\"1.3.1-3ubuntu1.3\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libapache2-svn\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-dev\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-doc\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-java\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-javahl\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-perl\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-ruby\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn-ruby1.8\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"libsvn1\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"python-subversion\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"python-subversion-dbg\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"subversion\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"8.04\", pkgname:\"subversion-tools\", pkgver:\"1.4.6dfsg1-2ubuntu1.2\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libapache2-svn\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-dev\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-doc\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-java\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-perl\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-ruby\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn-ruby1.8\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"libsvn1\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"python-subversion\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"python-subversion-dbg\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"subversion\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"9.10\", pkgname:\"subversion-tools\", pkgver:\"1.6.5dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libapache2-svn\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-dev\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-doc\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-java\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-perl\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-ruby\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn-ruby1.8\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"libsvn1\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"python-subversion\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"python-subversion-dbg\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"subversion\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.04\", pkgname:\"subversion-tools\", pkgver:\"1.6.6dfsg-2ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libapache2-svn\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-dev\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-doc\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-java\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-perl\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-ruby\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn-ruby1.8\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"libsvn1\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"python-subversion\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"python-subversion-dbg\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"subversion\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"10.10\", pkgname:\"subversion-tools\", pkgver:\"1.6.12dfsg-1ubuntu1.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libapache2-svn / libsvn-core-perl / libsvn-dev / libsvn-doc / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T13:01:44", "description": "The subversion server could have been crashed by clients inside SVNParentPath(). This has been fixed. CVE-2010-4539 has been assigned to this issue.", "cvss3": {"score": null, "vector": null}, "published": "2011-03-01T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : subversion (ZYPP Patch Number 7319)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539"], "modified": "2021-01-19T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_CVS2SVN-7319.NASL", "href": "https://www.tenable.com/plugins/nessus/52473", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(52473);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2010-4539\");\n\n script_name(english:\"SuSE 10 Security Update : subversion (ZYPP Patch Number 7319)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The subversion server could have been crashed by clients inside\nSVNParentPath(). This has been fixed. CVE-2010-4539 has been assigned\nto this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2010-4539.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7319.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/01/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/03/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"subversion-1.3.1-1.16.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"subversion-devel-1.3.1-1.16.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-08-19T12:52:51", "description": "The remote host is affected by the vulnerability described in GLSA-201309-11 (Subversion: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details.\n Impact :\n\n A remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2013-09-24T00:00:00", "type": "nessus", "title": "GLSA-201309-11 : Subversion: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644", "CVE-2011-0715", "CVE-2011-1752", "CVE-2011-1783", "CVE-2011-1921", "CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2013-1884", "CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112", "CVE-2013-4131", "CVE-2013-4277"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:subversion", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201309-11.NASL", "href": "https://www.tenable.com/plugins/nessus/70084", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201309-11.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(70084);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\", \"CVE-2011-0715\", \"CVE-2011-1752\", \"CVE-2011-1783\", \"CVE-2011-1921\", \"CVE-2013-1845\", \"CVE-2013-1846\", \"CVE-2013-1847\", \"CVE-2013-1849\", \"CVE-2013-1884\", \"CVE-2013-1968\", \"CVE-2013-2088\", \"CVE-2013-2112\", \"CVE-2013-4131\", \"CVE-2013-4277\");\n script_bugtraq_id(45655, 46734, 48091, 58323, 58895, 58896, 58897, 58898, 60264, 60265, 60267, 61454, 62266);\n script_xref(name:\"GLSA\", value:\"201309-11\");\n\n script_name(english:\"GLSA-201309-11 : Subversion: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201309-11\n(Subversion: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Subversion. Please\n review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could cause a Denial of Service condition or obtain\n sensitive information. A local attacker could escalate his privileges to\n the user running svnserve.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201309-11\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Subversion users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=dev-vcs/subversion-1.7.13'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:subversion\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2013/09/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"dev-vcs/subversion\", unaffected:make_list(\"ge 1.7.13\"), vulnerable:make_list(\"lt 1.7.13\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Subversion\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2018-01-02T10:58:28", "description": "Check for the Version of mod_dav_svn", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2018-01-02T00:00:00", "id": "OPENVAS:881320", "href": "http://plugins.openvas.org/nasl.php?oid=881320", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed "svn blame" or "svn log" operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n \n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n \n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\";\n\ntag_affected = \"mod_dav_svn on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-April/017287.html\");\n script_id(881320);\n script_version(\"$Revision: 8267 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-02 07:29:17 +0100 (Tue, 02 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:23:11 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2011:0257\");\n script_name(\"CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of mod_dav_svn\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:23", "description": "Oracle Linux Local Security Checks ELSA-2011-0257", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2011-0257", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122241", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122241", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2011-0257.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122241\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:15:20 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2011-0257\");\n script_tag(name:\"insight\", value:\"ELSA-2011-0257 - subversion security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2011-0257\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2011-0257.html\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2017-07-24T12:55:27", "description": "Check for the Version of subversion", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Mandriva Update for subversion MDVSA-2011:006 (subversion)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:831306", "href": "http://plugins.openvas.org/nasl.php?oid=831306", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for subversion MDVSA-2011:006 (subversion)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities has been found and corrected in subversion:\n\n The walk function in repos.c in the mod_dav_svn module for the Apache\n HTTP Server, as distributed in Apache Subversion before 1.6.15,\n allows remote authenticated users to cause a denial of service (NULL\n pointer dereference and daemon crash) via vectors that trigger the\n walking of SVNParentPath collections (CVE-2010-4539).\n \n Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\n allow remote authenticated users to cause a denial of service (memory\n consumption and daemon crash) via the -g option to the blame command\n (CVE-2010-4644).\n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. Please visit this link to learn more:\n http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490\n \n The updated packages have been upgraded to the latest versions (1.5.9,\n 1.6.15) which is not affected by these issues and in turn contains\n many bugfixes as well.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"subversion on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2011-01/msg00008.php\");\n script_id(831306);\n script_version(\"$Revision: 6570 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:06:35 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"MDVSA\", value: \"2011:006\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Mandriva Update for subversion MDVSA-2011:006 (subversion)\");\n\n script_summary(\"Check for the Version of subversion\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl0\", rpm:\"libsvnjavahl0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl0\", rpm:\"lib64svnjavahl0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn-gnome-keyring0\", rpm:\"libsvn-gnome-keyring0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl1\", rpm:\"libsvnjavahl1~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn-kwallet0\", rpm:\"libsvn-kwallet0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn-gnome-keyring0\", rpm:\"lib64svn-gnome-keyring0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl1\", rpm:\"lib64svnjavahl1~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn-kwallet0\", rpm:\"lib64svn-kwallet0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl1\", rpm:\"libsvnjavahl1~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl1\", rpm:\"lib64svnjavahl1~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl0\", rpm:\"libsvnjavahl0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl0\", rpm:\"lib64svnjavahl0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:42", "description": "Check for the Version of mod_dav_svn", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880558", "href": "http://plugins.openvas.org/nasl.php?oid=880558", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed "svn blame" or "svn log" operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n \n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n \n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"mod_dav_svn on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-April/017285.html\");\n script_id(880558);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2011:0257\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386\");\n\n script_summary(\"Check for the Version of mod_dav_svn\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:23", "description": "Check for the Version of subversion", "cvss3": {}, "published": "2011-02-18T00:00:00", "type": "openvas", "title": "RedHat Update for subversion RHSA-2011:0257-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:870397", "href": "http://plugins.openvas.org/nasl.php?oid=870397", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for subversion RHSA-2011:0257-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed "svn blame" or "svn log" operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n \n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n \n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\";\n\ntag_affected = \"subversion on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2011-February/msg00013.html\");\n script_id(870397);\n script_version(\"$Revision: 6685 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:44:46 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-18 15:15:05 +0100 (Fri, 18 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2011:0257-01\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"RedHat Update for subversion RHSA-2011:0257-01\");\n\n script_summary(\"Check for the Version of subversion\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-debuginfo\", rpm:\"subversion-debuginfo~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:47", "description": "Check for the Version of subversion", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Fedora Update for subversion FEDORA-2011-0099", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:862797", "href": "http://plugins.openvas.org/nasl.php?oid=862797", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for subversion FEDORA-2011-0099\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"subversion on Fedora 14\";\ntag_insight = \"Subversion is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a\n hierarchy of files and directories while keeping a history of all\n changes. Subversion only stores the differences between versions,\n instead of every complete file. Subversion is intended to be a\n compelling replacement for CVS.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html\");\n script_id(862797);\n script_version(\"$Revision: 6626 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:30:10 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"FEDORA\", value: \"2011-0099\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Fedora Update for subversion FEDORA-2011-0099\");\n\n script_summary(\"Check for the Version of subversion\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:13:42", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "cvss3": {}, "published": "2011-01-24T00:00:00", "type": "openvas", "title": "FreeBSD Ports: subversion", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2017-02-25T00:00:00", "id": "OPENVAS:68819", "href": "http://plugins.openvas.org/nasl.php?oid=68819", "sourceData": "#\n#VID 71612099-1e93-11e0-a587-001b77d09812\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from VID 71612099-1e93-11e0-a587-001b77d09812\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n subversion\n subversion-freebsd\n\nCVE-2010-4539\nThe walk function in repos.c in the mod_dav_svn module for the Apache\nHTTP Server, as distributed in Apache Subversion before 1.6.15, allows\nremote authenticated users to cause a denial of service (NULL pointer\ndereference and daemon crash) via vectors that trigger the walking of\nSVNParentPath collections.\n\nCVE-2010-4644\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\nallow remote authenticated users to cause a denial of service (memory\nconsumption and daemon crash) via the -g option to the blame command.\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\";\n\nif(description)\n{\n script_id(68819);\n script_version(\"$Revision: 5424 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-25 17:52:36 +0100 (Sat, 25 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_name(\"FreeBSD Ports: subversion\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"subversion\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.6.15\")<0) {\n txt += 'Package subversion version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"subversion-freebsd\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.6.15\")<0) {\n txt += 'Package subversion-freebsd version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:38:59", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881320", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881320", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-April/017287.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881320\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:23:11 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"CESA\", value:\"2011:0257\");\n script_name(\"CentOS Update for mod_dav_svn CESA-2011:0257 centos5 x86_64\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mod_dav_svn'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"mod_dav_svn on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed 'svn blame' or 'svn log' operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n\n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n\n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:48", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Mandriva Update for subversion MDVSA-2011:006 (subversion)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2018-11-16T00:00:00", "id": "OPENVAS:1361412562310831306", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831306", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for subversion MDVSA-2011:006 (subversion)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.mandriva.com/security-announce/2011-01/msg00008.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831306\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"MDVSA\", value:\"2011:006\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Mandriva Update for subversion MDVSA-2011:006 (subversion)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'subversion'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(mes5|2010\\.1|2010\\.0|2009\\.0)\");\n script_tag(name:\"affected\", value:\"subversion on Mandriva Linux 2009.0,\n Mandriva Linux 2009.0/X86_64,\n Mandriva Linux 2010.0,\n Mandriva Linux 2010.0/X86_64,\n Mandriva Linux 2010.1,\n Mandriva Linux 2010.1/X86_64,\n Mandriva Enterprise Server 5,\n Mandriva Enterprise Server 5/X86_64\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities has been found and corrected in subversion:\n\n The walk function in repos.c in the mod_dav_svn module for the Apache\n HTTP Server, as distributed in Apache Subversion before 1.6.15,\n allows remote authenticated users to cause a denial of service (NULL\n pointer dereference and daemon crash) via vectors that trigger the\n walking of SVNParentPath collections (CVE-2010-4539).\n\n Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\n allow remote authenticated users to cause a denial of service (memory\n consumption and daemon crash) via the -g option to the blame command\n (CVE-2010-4644).\n\n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. The updated packages have been upgraded to the latest versions (1.5.9,\n 1.6.15) which is not affected by these issues and in turn contains\n many bugfixes as well.\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_mes5\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl0\", rpm:\"libsvnjavahl0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl0\", rpm:\"lib64svnjavahl0~1.5.9~0.1mdvmes5.1\", rls:\"MNDK_mes5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn-gnome-keyring0\", rpm:\"libsvn-gnome-keyring0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl1\", rpm:\"libsvnjavahl1~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn-kwallet0\", rpm:\"libsvn-kwallet0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn-gnome-keyring0\", rpm:\"lib64svn-gnome-keyring0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl1\", rpm:\"lib64svnjavahl1~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn-kwallet0\", rpm:\"lib64svn-kwallet0~1.6.15~0.1mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl1\", rpm:\"libsvnjavahl1~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl1\", rpm:\"lib64svnjavahl1~1.6.15~0.1mdv2010.0\", rls:\"MNDK_2010.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2009.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dav_svn\", rpm:\"apache-mod_dav_svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"apache-mod_dontdothat\", rpm:\"apache-mod_dontdothat~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvn0\", rpm:\"libsvn0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libsvnjavahl0\", rpm:\"libsvnjavahl0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-SVN\", rpm:\"perl-SVN~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-svn\", rpm:\"python-svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"ruby-svn\", rpm:\"ruby-svn~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-doc\", rpm:\"subversion-doc~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-server\", rpm:\"subversion-server~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-tools\", rpm:\"subversion-tools~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"svn-javahl\", rpm:\"svn-javahl~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svn0\", rpm:\"lib64svn0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64svnjavahl0\", rpm:\"lib64svnjavahl0~1.5.9~0.1mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:53", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-08-09T00:00:00", "type": "openvas", "title": "CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310880558", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880558", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-April/017285.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880558\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"CESA\", value:\"2011:0257\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"CentOS Update for mod_dav_svn CESA-2011:0257 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'mod_dav_svn'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"mod_dav_svn on CentOS 5\");\n script_tag(name:\"insight\", value:\"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed 'svn blame' or 'svn log' operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n\n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n\n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:33", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-02-18T00:00:00", "type": "openvas", "title": "RedHat Update for subversion RHSA-2011:0257-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310870397", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870397", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for subversion RHSA-2011:0257-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2011-February/msg00013.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870397\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-18 15:15:05 +0100 (Fri, 18 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"RHSA\", value:\"2011:0257-01\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"RedHat Update for subversion RHSA-2011:0257-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'subversion'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_5\");\n script_tag(name:\"affected\", value:\"subversion on Red Hat Enterprise Linux (v. 5 server)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes.\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed 'svn blame' or 'svn log' operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n\n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n (for use with the Apache HTTP Server) processed certain requests. If a\n malicious, remote user issued a certain type of request to display a\n collection of Subversion repositories on a host that has the\n SVNListParentPath directive enabled, it could cause the httpd process\n serving the request to crash. Note that SVNListParentPath is not enabled by\n default. (CVE-2010-4539)\n\n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-debuginfo\", rpm:\"subversion-debuginfo~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~7.el5_6.1\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:57", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-01-21T00:00:00", "type": "openvas", "title": "Fedora Update for subversion FEDORA-2011-0099", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310862797", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310862797", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for subversion FEDORA-2011-0099\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.862797\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-21 14:59:01 +0100 (Fri, 21 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"FEDORA\", value:\"2011-0099\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Fedora Update for subversion FEDORA-2011-0099\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'subversion'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC14\");\n script_tag(name:\"affected\", value:\"subversion on Fedora 14\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC14\")\n{\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.15~1.fc14\", rls:\"FC14\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:39:38", "description": "The remote host is missing an update to the system\n as announced in the referenced advisory.", "cvss3": {}, "published": "2011-01-24T00:00:00", "type": "openvas", "title": "FreeBSD Ports: subversion", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2018-10-05T00:00:00", "id": "OPENVAS:136141256231068819", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231068819", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: freebsd_subversion2.nasl 11762 2018-10-05 10:54:12Z cfischer $\n#\n# Auto generated from VID 71612099-1e93-11e0-a587-001b77d09812\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.68819\");\n script_version(\"$Revision: 11762 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-05 12:54:12 +0200 (Fri, 05 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-01-24 17:55:59 +0100 (Mon, 24 Jan 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\");\n script_bugtraq_id(45655);\n script_name(\"FreeBSD Ports: subversion\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsd\", \"ssh/login/freebsdrel\");\n\n script_tag(name:\"insight\", value:\"The following packages are affected:\n\n subversion\n subversion-freebsd\n\nCVE-2010-4539\nThe walk function in repos.c in the mod_dav_svn module for the Apache\nHTTP Server, as distributed in Apache Subversion before 1.6.15, allows\nremote authenticated users to cause a denial of service (NULL pointer\ndereference and daemon crash) via vectors that trigger the walking of\nSVNParentPath collections.\n\nCVE-2010-4644\nMultiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\nallow remote authenticated users to cause a denial of service (memory\nconsumption and daemon crash) via the -g option to the blame command.\");\n\n script_tag(name:\"solution\", value:\"Update your system with the appropriate patches or\n software upgrades.\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update to the system\n as announced in the referenced advisory.\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-bsd.inc\");\n\nvuln = FALSE;\ntxt = \"\";\n\nbver = portver(pkg:\"subversion\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.6.15\")<0) {\n txt += 'Package subversion version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\nbver = portver(pkg:\"subversion-freebsd\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.6.15\")<0) {\n txt += 'Package subversion-freebsd version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = TRUE;\n}\n\nif(vuln) {\n security_message(data:txt);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2018-01-11T11:06:24", "description": "Check for the Version of subversion", "cvss3": {}, "published": "2012-06-05T00:00:00", "type": "openvas", "title": "RedHat Update for subversion RHSA-2011:0258-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:870654", "href": "http://plugins.openvas.org/nasl.php?oid=870654", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for subversion RHSA-2011:0258-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes. The\n mod_dav_svn module is used with the Apache HTTP Server to allow access to\n Subversion repositories via HTTP.\n\n An access restriction bypass flaw was found in the mod_dav_svn module. If\n the SVNPathAuthz directive was set to "short_circuit", certain access rules\n were not enforced, possibly allowing sensitive repository data to be leaked\n to remote users. Note that SVNPathAuthz is set to "On" by default.\n (CVE-2010-3315)\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed "svn blame" or "svn log" operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n\n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n processed certain requests. If a malicious, remote user issued a certain\n type of request to display a collection of Subversion repositories on a\n host that has the SVNListParentPath directive enabled, it could cause the\n httpd process serving the request to crash. Note that SVNListParentPath is\n not enabled by default. (CVE-2010-4539)\n\n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\";\n\ntag_affected = \"subversion on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2011-February/msg00014.html\");\n script_id(870654);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-05 19:35:39 +0530 (Tue, 05 Jun 2012)\");\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2011:0258-01\");\n script_name(\"RedHat Update for subversion RHSA-2011:0258-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of subversion\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-debuginfo\", rpm:\"subversion-debuginfo~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:36:20", "description": "Oracle Linux Local Security Checks ELSA-2011-0258", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2011-0258", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122243", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122243", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2011-0258.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122243\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:15:21 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2011-0258\");\n script_tag(name:\"insight\", value:\"ELSA-2011-0258 - subversion security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2011-0258\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2011-0258.html\");\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux6\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-devel\", rpm:\"subversion-devel~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-gnome\", rpm:\"subversion-gnome~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-kde\", rpm:\"subversion-kde~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-perl\", rpm:\"subversion-perl~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-ruby\", rpm:\"subversion-ruby~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"subversion-svn2cl\", rpm:\"subversion-svn2cl~1.6.11~2.el6_0.2\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:38:37", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-06-05T00:00:00", "type": "openvas", "title": "RedHat Update for subversion RHSA-2011:0258-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315"], "modified": "2019-03-12T00:00:00", "id": "OPENVAS:1361412562310870654", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870654", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for subversion RHSA-2011:0258-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2011-February/msg00014.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870654\");\n script_version(\"$Revision: 14114 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-12 12:48:52 +0100 (Tue, 12 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-06-05 19:35:39 +0530 (Tue, 05 Jun 2012)\");\n script_cve_id(\"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"RHSA\", value:\"2011:0258-01\");\n script_name(\"RedHat Update for subversion RHSA-2011:0258-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'subversion'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n script_tag(name:\"affected\", value:\"subversion on Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"Subversion (SVN) is a concurrent version control system which enables one\n or more users to collaborate in developing and maintaining a hierarchy of\n files and directories while keeping a history of all changes. The\n mod_dav_svn module is used with the Apache HTTP Server to allow access to\n Subversion repositories via HTTP.\n\n An access restriction bypass flaw was found in the mod_dav_svn module. If\n the SVNPathAuthz directive was set to 'short_circuit', certain access rules\n were not enforced, possibly allowing sensitive repository data to be leaked\n to remote users. Note that SVNPathAuthz is set to 'On' by default.\n (CVE-2010-3315)\n\n A server-side memory leak was found in the Subversion server. If a\n malicious, remote user performed 'svn blame' or 'svn log' operations on\n certain repository files, it could cause the Subversion server to consume\n a large amount of system memory. (CVE-2010-4644)\n\n A NULL pointer dereference flaw was found in the way the mod_dav_svn module\n processed certain requests. If a malicious, remote user issued a certain\n type of request to display a collection of Subversion repositories on a\n host that has the SVNListParentPath directive enabled, it could cause the\n httpd process serving the request to crash. Note that SVNListParentPath is\n not enabled by default. (CVE-2010-4539)\n\n All Subversion users should upgrade to these updated packages, which\n contain backported patches to correct these issues. After installing the\n updated packages, the Subversion server must be restarted for the update\n to take effect: restart httpd if you are using mod_dav_svn, or restart\n svnserve if it is used.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"mod_dav_svn\", rpm:\"mod_dav_svn~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion\", rpm:\"subversion~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-debuginfo\", rpm:\"subversion-debuginfo~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"subversion-javahl\", rpm:\"subversion-javahl~1.6.11~2.el6_0.2\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2017-12-04T11:26:46", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1053-1", "cvss3": {}, "published": "2011-02-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for subversion vulnerabilities USN-1053-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315", "CVE-2007-2448"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840580", "href": "http://plugins.openvas.org/nasl.php?oid=840580", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1053_1.nasl 7964 2017-12-01 07:32:11Z santu $\n#\n# Ubuntu Update for subversion vulnerabilities USN-1053-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that Subversion incorrectly handled certain 'partial\n access' privileges in rare scenarios. Remote authenticated users could use\n this flaw to obtain sensitive information (revision properties). This issue\n only applied to Ubuntu 6.06 LTS. (CVE-2007-2448)\n\n It was discovered that the Subversion mod_dav_svn module for Apache did not\n properly handle a named repository as a rule scope. Remote authenticated\n users could use this flaw to bypass intended restrictions. This issue only\n applied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-3315)\n \n It was discovered that the Subversion mod_dav_svn module for Apache\n incorrectly handled the walk function. Remote authenticated users could use\n this flaw to cause the service to crash, leading to a denial of service.\n (CVE-2010-4539)\n \n It was discovered that Subversion incorrectly handled certain memory\n operations. Remote authenticated users could use this flaw to consume large\n quantities of memory and cause the service to crash, leading to a denial of\n service. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10.\n (CVE-2010-4644)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-1053-1\";\ntag_affected = \"subversion vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 8.04 LTS ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS ,\n Ubuntu 10.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-1053-1/\");\n script_id(840580);\n script_version(\"$Revision: 7964 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 08:32:11 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name: \"USN\", value: \"1053-1\");\n script_cve_id(\"CVE-2007-2448\", \"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Ubuntu Update for subversion vulnerabilities USN-1053-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-core-perl\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-javahl\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn0-dev\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn0\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python2.4-subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-javahl\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-05-29T18:40:02", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-1053-1", "cvss3": {}, "published": "2011-02-04T00:00:00", "type": "openvas", "title": "Ubuntu Update for subversion vulnerabilities USN-1053-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315", "CVE-2007-2448"], "modified": "2019-03-13T00:00:00", "id": "OPENVAS:1361412562310840580", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840580", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_1053_1.nasl 14132 2019-03-13 09:25:59Z cfischer $\n#\n# Ubuntu Update for subversion vulnerabilities USN-1053-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-1053-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840580\");\n script_version(\"$Revision: 14132 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 10:25:59 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-02-04 14:19:53 +0100 (Fri, 04 Feb 2011)\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:N/I:N/A:C\");\n script_xref(name:\"USN\", value:\"1053-1\");\n script_cve_id(\"CVE-2007-2448\", \"CVE-2010-3315\", \"CVE-2010-4539\", \"CVE-2010-4644\");\n script_name(\"Ubuntu Update for subversion vulnerabilities USN-1053-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(9\\.10|6\\.06 LTS|10\\.04 LTS|8\\.04 LTS|10\\.10)\");\n script_tag(name:\"summary\", value:\"Ubuntu Update for Linux kernel vulnerabilities USN-1053-1\");\n script_tag(name:\"affected\", value:\"subversion vulnerabilities on Ubuntu 6.06 LTS,\n Ubuntu 8.04 LTS,\n Ubuntu 9.10,\n Ubuntu 10.04 LTS,\n Ubuntu 10.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"It was discovered that Subversion incorrectly handled certain 'partial\n access' privileges in rare scenarios. Remote authenticated users could use\n this flaw to obtain sensitive information (revision properties). This issue\n only applied to Ubuntu 6.06 LTS. (CVE-2007-2448)\n\n It was discovered that the Subversion mod_dav_svn module for Apache did not\n properly handle a named repository as a rule scope. Remote authenticated\n users could use this flaw to bypass intended restrictions. This issue only\n applied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-3315)\n\n It was discovered that the Subversion mod_dav_svn module for Apache\n incorrectly handled the walk function. Remote authenticated users could use\n this flaw to cause the service to crash, leading to a denial of service.\n (CVE-2010-4539)\n\n It was discovered that Subversion incorrectly handled certain memory\n operations. Remote authenticated users could use this flaw to consume large\n quantities of memory and cause the service to crash, leading to a denial of\n service. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10.\n (CVE-2010-4644)\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.5dfsg-1ubuntu1.1\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-core-perl\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-javahl\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn0-dev\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn0\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python2.4-subversion\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.3.1-3ubuntu1.3\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.6dfsg-2ubuntu1.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-javahl\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.4.6dfsg1-2ubuntu1.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libsvn-dev\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-perl\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn1\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion-dbg\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-subversion\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libapache2-svn\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-java\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby1.8\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-doc\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"subversion-tools\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libsvn-ruby\", ver:\"1.6.12dfsg-1ubuntu1.1\", rls:\"UBUNTU10.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:41", "description": "Gentoo Linux Local Security Checks GLSA 201309-11", "cvss3": {}, "published": "2015-09-29T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201309-11", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2011-1783", "CVE-2013-4277", "CVE-2013-1884", "CVE-2011-1752", "CVE-2013-1849", "CVE-2013-1845", "CVE-2013-1846", "CVE-2011-1921", "CVE-2011-0715", "CVE-2013-1847", "CVE-2013-2088", "CVE-2013-4131", "CVE-2013-1968", "CVE-2013-2112"], "modified": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310121025", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121025", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201309-11.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121025\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-09-29 11:25:50 +0300 (Tue, 29 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201309-11\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201309-11\");\n script_cve_id(\"CVE-2010-4539\", \"CVE-2010-4644\", \"CVE-2011-0715\", \"CVE-2011-1752\", \"CVE-2011-1783\", \"CVE-2011-1921\", \"CVE-2013-1845\", \"CVE-2013-1846\", \"CVE-2013-1847\", \"CVE-2013-1849\", \"CVE-2013-1884\", \"CVE-2013-1968\", \"CVE-2013-2088\", \"CVE-2013-2112\", \"CVE-2013-4131\", \"CVE-2013-4277\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201309-11\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"dev-vcs/subversion\", unaffected: make_list(\"ge 1.7.13\"), vulnerable: make_list(\"lt 1.7.13\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2022-02-27T11:57:04", "description": "**CentOS Errata and Security Advisory** CESA-2011:0257\n\n\nSubversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes.\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed \"svn blame\" or \"svn log\" operations on\ncertain repository files, it could cause the Subversion server to consume\na large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\n(for use with the Apache HTTP Server) processed certain requests. If a\nmalicious, remote user issued a certain type of request to display a\ncollection of Subversion repositories on a host that has the\nSVNListParentPath directive enabled, it could cause the httpd process\nserving the request to crash. Note that SVNListParentPath is not enabled by\ndefault. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the Subversion server must be restarted for the update\nto take effect: restart httpd if you are using mod_dav_svn, or restart\nsvnserve if it is used.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2011-April/054204.html\nhttps://lists.centos.org/pipermail/centos-announce/2011-April/054206.html\n\n**Affected packages:**\nmod_dav_svn\nsubversion\nsubversion-devel\nsubversion-javahl\nsubversion-perl\nsubversion-ruby\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2011:0257", "cvss3": {}, "published": "2011-04-14T13:37:25", "type": "centos", "title": "mod_dav_svn, subversion security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2011-04-14T13:37:25", "id": "CESA-2011:0257", "href": "https://lists.centos.org/pipermail/centos-announce/2011-April/054204.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "securityvulns": [{"lastseen": "2021-06-08T18:53:32", "bulletinFamily": "software", "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "description": "PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.", "edition": 2, "modified": "2011-01-20T00:00:00", "published": "2011-01-20T00:00:00", "id": "SECURITYVULNS:VULN:11366", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11366", "title": "Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)", "type": "securityvulns", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2021-10-23T23:09:14", "description": "Sven Hoexter uploaded new packages for subversion which fixed the\nfollowing security problems:\n\nCVE-2010-4539\n A NULL pointer dereference flaw exisits in mod_dav_svn, the Apache\n httpd module for the Subversion server, when listing of repositories\n (SVNListParentPath directive) is enabled. A remote user could use\n this flaw to cause denial of service (particular httpd thread crash).\n http://security-tracker.debian.org/tracker/CVE-2010-4539\n\nCVE-2010-4644\n A server-side memory leak allows remote users to cause a denial\n of service (memory consumption and daemon outage or crash) via\n Subversion client "blame" or "log" operations, when the "-g" option\n (request to display additional merge history) is used.\n http://security-tracker.debian.org/tracker/CVE-2010-4644\n\nFor the lenny-backports distribution, the problems have been fixed in\nversion 1.6.12dfsg-4~bpo50+1.\n\nFor the upcoming stable version (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 1.6.12dfsg-4.\n\nUpgrade instructions\n- --------------------\n\nIf you don't use pinning (see [1]) you have to update the package\nmanually via "apt-get -t lenny-backports install <packagelist>" with\nthe packagelist of your installed packages affected by this update.\n[1] <http://backports.debian.org/Instructions>\n\nWe recommend to pin (in /etc/apt/preferences) the backports repository to\n200 so that new versions of installed backports will be installed\nautomatically.\n\n Package: *\n Pin: release a=lenny-backports\n Pin-Priority: 200\n\n- -- \nMichael Diers, elego Software Solutions GmbH, http://www.elego.de", "cvss3": {}, "published": "2011-01-10T15:12:05", "type": "debian", "title": "[BSA-017] Security Update for subversion", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2011-01-10T15:12:05", "id": "DEBIAN:BSA-017:CAAB8", "href": "https://lists.debian.org/debian-backports-announce/2011/01/msg00003.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:50", "description": "Subversion is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Subversion only stores the differences between versions, instead of every complete file. Subversion is intended to be a compelling replacement for CVS. ", "cvss3": {}, "published": "2011-01-18T21:35:07", "type": "fedora", "title": "[SECURITY] Fedora 14 Update: subversion-1.6.15-1.fc14", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2011-01-18T21:35:07", "id": "FEDORA:AEED9110D35", "href": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BKVP2E3HTFQQWYBYUFBQWR5WIWQOQNEG/", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2022-01-19T16:03:50", "description": "\n\nEntry for CVE-2010-4539 says:\n\nThe walk function in repos.c in the mod_dav_svn module\n\t for the Apache HTTP Server, as distributed in Apache\n\t Subversion before 1.6.15, allows remote authenticated\n\t users to cause a denial of service (NULL pointer\n\t dereference and daemon crash) via vectors that trigger\n\t the walking of SVNParentPath collections.\n\nEntry for CVE-2010-4644 says:\n\nMultiple memory leaks in rev_hunt.c in Apache Subversion\n\t before 1.6.15 allow remote authenticated users to cause\n\t a denial of service (memory consumption and daemon crash)\n\t via the -g option to the blame command.\n\n\n", "cvss3": {}, "published": "2011-01-02T00:00:00", "type": "freebsd", "title": "subversion -- multiple DoS", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2011-01-02T00:00:00", "id": "71612099-1E93-11E0-A587-001B77D09812", "href": "https://vuxml.freebsd.org/freebsd/71612099-1e93-11e0-a587-001b77d09812.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:26", "description": "[1.6.11-7.1]\n- add security fixes for CVE-2010-4644, CVE-2010-4539 (#672676)", "cvss3": {}, "published": "2011-02-15T00:00:00", "type": "oraclelinux", "title": "subversion security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539"], "modified": "2011-02-15T00:00:00", "id": "ELSA-2011-0257", "href": "http://linux.oracle.com/errata/ELSA-2011-0257.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:36:39", "description": "[1.6.11-2.2]\n- add security fixes for CVE-2010-4644, CVE-2010-4539 (#672678)\n[1.6.11-2.1]\n- add security fix for CVE-2010-3315 (#640322)", "cvss3": {}, "published": "2011-02-15T00:00:00", "type": "oraclelinux", "title": "subversion security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2010-4644", "CVE-2010-4539", "CVE-2010-3315"], "modified": "2011-02-15T00:00:00", "id": "ELSA-2011-0258", "href": "http://linux.oracle.com/errata/ELSA-2011-0258.html", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2021-10-21T04:44:17", "description": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes.\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed \"svn blame\" or \"svn log\" operations on\ncertain repository files, it could cause the Subversion server to consume\na large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\n(for use with the Apache HTTP Server) processed certain requests. If a\nmalicious, remote user issued a certain type of request to display a\ncollection of Subversion repositories on a host that has the\nSVNListParentPath directive enabled, it could cause the httpd process\nserving the request to crash. Note that SVNListParentPath is not enabled by\ndefault. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the Subversion server must be restarted for the update\nto take effect: restart httpd if you are using mod_dav_svn, or restart\nsvnserve if it is used.\n", "cvss3": {}, "published": "2011-02-15T00:00:00", "type": "redhat", "title": "(RHSA-2011:0257) Moderate: subversion security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644"], "modified": "2017-09-08T07:57:20", "id": "RHSA-2011:0257", "href": "https://access.redhat.com/errata/RHSA-2011:0257", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}, {"lastseen": "2021-10-19T18:42:31", "description": "Subversion (SVN) is a concurrent version control system which enables one\nor more users to collaborate in developing and maintaining a hierarchy of\nfiles and directories while keeping a history of all changes. The\nmod_dav_svn module is used with the Apache HTTP Server to allow access to\nSubversion repositories via HTTP.\n\nAn access restriction bypass flaw was found in the mod_dav_svn module. If\nthe SVNPathAuthz directive was set to \"short_circuit\", certain access rules\nwere not enforced, possibly allowing sensitive repository data to be leaked\nto remote users. Note that SVNPathAuthz is set to \"On\" by default.\n(CVE-2010-3315)\n\nA server-side memory leak was found in the Subversion server. If a\nmalicious, remote user performed \"svn blame\" or \"svn log\" operations on\ncertain repository files, it could cause the Subversion server to consume\na large amount of system memory. (CVE-2010-4644)\n\nA NULL pointer dereference flaw was found in the way the mod_dav_svn module\nprocessed certain requests. If a malicious, remote user issued a certain\ntype of request to display a collection of Subversion repositories on a\nhost that has the SVNListParentPath directive enabled, it could cause the\nhttpd process serving the request to crash. Note that SVNListParentPath is\nnot enabled by default. (CVE-2010-4539)\n\nAll Subversion users should upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing the\nupdated packages, the Subversion server must be restarted for the update\nto take effect: restart httpd if you are using mod_dav_svn, or restart\nsvnserve if it is used.\n", "cvss3": {}, "published": "2011-02-15T00:00:00", "type": "redhat", "title": "(RHSA-2011:0258) Moderate: subversion security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3315", "CVE-2010-4539", "CVE-2010-4644"], "modified": "2018-06-06T16:24:28", "id": "RHSA-2011:0258", "href": "https://access.redhat.com/errata/RHSA-2011:0258", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2022-01-04T13:16:34", "description": "It was discovered that Subversion incorrectly handled certain 'partial \naccess' privileges in rare scenarios. Remote authenticated users could use \nthis flaw to obtain sensitive information (revision properties). This issue \nonly applied to Ubuntu 6.06 LTS. (CVE-2007-2448)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache did not \nproperly handle a named repository as a rule scope. Remote authenticated \nusers could use this flaw to bypass intended restrictions. This issue only \napplied to Ubuntu 9.10, 10.04 LTS, and 10.10. (CVE-2010-3315)\n\nIt was discovered that the Subversion mod_dav_svn module for Apache \nincorrectly handled the walk function. Remote authenticated users could use \nthis flaw to cause the service to crash, leading to a denial of service. \n(CVE-2010-4539)\n\nIt was discovered that Subversion incorrectly handled certain memory \noperations. Remote authenticated users could use this flaw to consume large \nquantities of memory and cause the service to crash, leading to a denial of \nservice. This issue only applied to Ubuntu 9.10, 10.04 LTS, and 10.10. \n(CVE-2010-4644)\n", "cvss3": {}, "published": "2011-02-01T00:00:00", "type": "ubuntu", "title": "Subversion vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2007-2448", "CVE-2010-3315", "CVE-2010-4644"], "modified": "2011-02-01T00:00:00", "id": "USN-1053-1", "href": "https://ubuntu.com/security/notices/USN-1053-1", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "veracode": [{"lastseen": "2022-07-27T10:55:56", "description": "subversion is vulnerable to denial of service (DoS). The vulnerability exists as a server-side memory leak was found in the Subversion server. If a malicious, remote user performed \"svn blame\" or \"svn log\" operations on certain repository files, it could cause the Subversion server to consume a large amount of system memory.\n", "cvss3": {}, "published": "2020-04-10T00:53:38", "type": "veracode", "title": "Denial Of Service (DoS)", "bulletinFamily": "software", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4644"], "modified": "2022-04-19T18:32:19", "id": "VERACODE:24407", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-24407/summary", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2022-07-27T10:14:20", "description": "subversion is vulnerable to denial of service (DoS). The vulnerability exists as a NULL pointer dereference flaw was found in the way the mod_dav_svn module (for use with the Apache HTTP Server) processed certain requests. If a malicious, remote user issued a certain type of request to display a collection of Subversion repositories on a host that has the SVNListParentPath directive enabled, it could cause the httpd process serving the request to crash. Note that SVNListParentPath is not enabled by default.\n", "cvss3": {}, "published": "2020-04-10T00:53:38", "type": "veracode", "title": "Denial Of Service (DoS)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539"], "modified": "2022-04-19T18:25:44", "id": "VERACODE:24406", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-24406/summary", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "cve": [{"lastseen": "2022-03-23T12:53:24", "description": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.", "cvss3": {}, "published": "2011-01-07T19:00:00", "type": "cve", "title": "CVE-2010-4644", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4644"], "modified": "2017-08-17T01:33:00", "cpe": ["cpe:/a:apache:subversion:0.16.1", "cpe:/a:apache:subversion:1.4.2", "cpe:/a:apache:subversion:1.5.3", "cpe:/a:apache:subversion:0.36.0", "cpe:/a:apache:subversion:1.6.13", "cpe:/a:apache:subversion:0.15", "cpe:/a:apache:subversion:0.18.1", "cpe:/a:apache:subversion:0.28.1", "cpe:/a:apache:subversion:0.19.1", "cpe:/a:apache:subversion:1.2.1", "cpe:/a:apache:subversion:0.20.0", "cpe:/a:apache:subversion:1.6.7", "cpe:/a:apache:subversion:1.4.6", "cpe:/a:apache:subversion:1.6.5", "cpe:/a:apache:subversion:1.0.3", "cpe:/a:apache:subversion:0.24.2", "cpe:/a:apache:subversion:1.2.2", "cpe:/a:apache:subversion:0.17.0", "cpe:/a:apache:subversion:0.14.5", "cpe:/a:apache:subversion:1.0.0", "cpe:/a:apache:subversion:0.27.0", "cpe:/a:apache:subversion:0.26.0", "cpe:/a:apache:subversion:1.0.8", "cpe:/a:apache:subversion:0.37.0", "cpe:/a:apache:subversion:1.3.2", "cpe:/a:apache:subversion:1.1.2", "cpe:/a:apache:subversion:1.2.3", "cpe:/a:apache:subversion:1.3.0", "cpe:/a:apache:subversion:1.5.1", "cpe:/a:apache:subversion:0.10.2", "cpe:/a:apache:subversion:0.11.1", "cpe:/a:apache:subversion:1.6.9", "cpe:/a:apache:subversion:1.0.1", "cpe:/a:apache:subversion:1.4.1", "cpe:/a:apache:subversion:0.33.0", "cpe:/a:apache:subversion:1.0.6", "cpe:/a:apache:subversion:0.14.0", "cpe:/a:apache:subversion:0.24.0", "cpe:/a:apache:subversion:0.17.1", "cpe:/a:apache:subversion:0.28.2", "cpe:/a:apache:subversion:1.1.3", "cpe:/a:apache:subversion:0.19.0", "cpe:/a:apache:subversion:0.6", "cpe:/a:apache:subversion:m3", "cpe:/a:apache:subversion:1.5.0", "cpe:/a:apache:subversion:0.13.1", "cpe:/a:apache:subversion:0.23.0", "cpe:/a:apache:subversion:0.8", "cpe:/a:apache:subversion:0.21.0", "cpe:/a:apache:subversion:1.1.4", "cpe:/a:apache:subversion:0.12.0", "cpe:/a:apache:subversion:1.0.5", "cpe:/a:apache:subversion:1.5.7", "cpe:/a:apache:subversion:1.6.1", "cpe:/a:apache:subversion:0.35.0", "cpe:/a:apache:subversion:1.1.1", "cpe:/a:apache:subversion:0.22.2", "cpe:/a:apache:subversion:0.7", "cpe:/a:apache:subversion:1.0.7", "cpe:/a:apache:subversion:1.6.14", "cpe:/a:apache:subversion:1.3.1", "cpe:/a:apache:subversion:1.4.0", "cpe:/a:apache:subversion:0.13.0", "cpe:/a:apache:subversion:1.0.2", "cpe:/a:apache:subversion:1.0.9", "cpe:/a:apache:subversion:0.9", "cpe:/a:apache:subversion:0.25.0", "cpe:/a:apache:subversion:0.35.1", "cpe:/a:apache:subversion:1.5.4", "cpe:/a:apache:subversion:0.14.4", "cpe:/a:apache:subversion:1.5.8", "cpe:/a:apache:subversion:0.33.1", "cpe:/a:apache:subversion:0.30.0", "cpe:/a:apache:subversion:1.6.10", "cpe:/a:apache:subversion:0.29.0", "cpe:/a:apache:subversion:1.2.0", "cpe:/a:apache:subversion:0.14.2", "cpe:/a:apache:subversion:0.16", "cpe:/a:apache:subversion:1.6.4", "cpe:/a:apache:subversion:0.32.1", "cpe:/a:apache:subversion:1.5.6", "cpe:/a:apache:subversion:0.14.3", "cpe:/a:apache:subversion:m2", "cpe:/a:apache:subversion:0.13.2", "cpe:/a:apache:subversion:1.5.2", "cpe:/a:apache:subversion:1.6.2", "cpe:/a:apache:subversion:0.10.1", "cpe:/a:apache:subversion:1.6.12", "cpe:/a:apache:subversion:0.28.0", "cpe:/a:apache:subversion:1.6.8", "cpe:/a:apache:subversion:0.24.1", "cpe:/a:apache:subversion:1.6.6", "cpe:/a:apache:subversion:m1", "cpe:/a:apache:subversion:1.6.11", "cpe:/a:apache:subversion:0.34.0", "cpe:/a:apache:subversion:1.1.0", "cpe:/a:apache:subversion:1.0.4", "cpe:/a:apache:subversion:1.6.3", "cpe:/a:apache:subversion:0.14.1", "cpe:/a:apache:subversion:0.10.0", "cpe:/a:apache:subversion:1.4.5", "cpe:/a:apache:subversion:0.31.0", "cpe:/a:apache:subversion:1.4.3", "cpe:/a:apache:subversion:0.20.1", "cpe:/a:apache:subversion:m4\\/m5", "cpe:/a:apache:subversion:1.4.4", "cpe:/a:apache:subversion:0.18.0", "cpe:/a:apache:subversion:0.22.1", "cpe:/a:apache:subversion:1.6.0", "cpe:/a:apache:subversion:1.5.5", "cpe:/a:apache:subversion:0.22.0"], "id": "CVE-2010-4644", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4644", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:50:43", "description": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.", "cvss3": {}, "published": "2011-01-07T19:00:00", "type": "cve", "title": "CVE-2010-4539", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539"], "modified": "2017-08-17T01:33:00", "cpe": ["cpe:/a:apache:subversion:0.16.1", "cpe:/a:apache:subversion:1.4.2", "cpe:/a:apache:subversion:1.5.3", "cpe:/a:apache:subversion:0.36.0", "cpe:/a:apache:subversion:1.6.13", "cpe:/a:apache:subversion:0.15", "cpe:/a:apache:subversion:0.18.1", "cpe:/a:apache:subversion:0.28.1", "cpe:/a:apache:subversion:0.19.1", "cpe:/a:apache:subversion:1.2.1", "cpe:/a:apache:subversion:0.20.0", "cpe:/a:apache:subversion:1.6.7", "cpe:/a:apache:subversion:1.4.6", "cpe:/a:apache:subversion:1.6.5", "cpe:/a:apache:subversion:1.0.3", "cpe:/a:apache:subversion:0.24.2", "cpe:/a:apache:subversion:1.2.2", "cpe:/a:apache:subversion:0.17.0", "cpe:/a:apache:subversion:0.14.5", "cpe:/a:apache:subversion:1.0.0", "cpe:/a:apache:subversion:0.27.0", "cpe:/a:apache:subversion:0.26.0", "cpe:/a:apache:subversion:1.0.8", "cpe:/a:apache:subversion:0.37.0", "cpe:/a:apache:subversion:1.3.2", "cpe:/a:apache:subversion:1.1.2", "cpe:/a:apache:subversion:1.2.3", "cpe:/a:apache:subversion:1.3.0", "cpe:/a:apache:subversion:1.5.1", "cpe:/a:apache:subversion:0.10.2", "cpe:/a:apache:subversion:0.11.1", "cpe:/a:apache:subversion:1.6.9", "cpe:/a:apache:subversion:1.0.1", "cpe:/a:apache:subversion:1.4.1", "cpe:/a:apache:subversion:0.33.0", "cpe:/a:apache:subversion:1.0.6", "cpe:/a:apache:subversion:0.14.0", "cpe:/a:apache:subversion:0.24.0", "cpe:/a:apache:subversion:0.17.1", "cpe:/a:apache:subversion:0.28.2", "cpe:/a:apache:subversion:1.1.3", "cpe:/a:apache:subversion:0.19.0", "cpe:/a:apache:subversion:0.6", "cpe:/a:apache:subversion:m3", "cpe:/a:apache:subversion:1.5.0", "cpe:/a:apache:subversion:0.13.1", "cpe:/a:apache:subversion:0.23.0", "cpe:/a:apache:subversion:0.8", "cpe:/a:apache:subversion:0.21.0", "cpe:/a:apache:subversion:1.1.4", "cpe:/a:apache:subversion:0.12.0", "cpe:/a:apache:subversion:1.0.5", "cpe:/a:apache:subversion:1.5.7", "cpe:/a:apache:subversion:1.6.1", "cpe:/a:apache:subversion:0.35.0", "cpe:/a:apache:subversion:1.1.1", "cpe:/a:apache:subversion:0.22.2", "cpe:/a:apache:subversion:0.7", "cpe:/a:apache:subversion:1.0.7", "cpe:/a:apache:subversion:1.6.14", "cpe:/a:apache:subversion:1.3.1", "cpe:/a:apache:subversion:1.4.0", "cpe:/a:apache:subversion:0.13.0", "cpe:/a:apache:subversion:1.0.2", "cpe:/a:apache:subversion:1.0.9", "cpe:/a:apache:subversion:0.9", "cpe:/a:apache:subversion:0.25.0", "cpe:/a:apache:subversion:0.35.1", "cpe:/a:apache:subversion:1.5.4", "cpe:/a:apache:subversion:0.14.4", "cpe:/a:apache:subversion:1.5.8", "cpe:/a:apache:subversion:0.33.1", "cpe:/a:apache:subversion:0.30.0", "cpe:/a:apache:subversion:1.6.10", "cpe:/a:apache:subversion:0.29.0", "cpe:/a:apache:subversion:1.2.0", "cpe:/a:apache:subversion:0.14.2", "cpe:/a:apache:subversion:0.16", "cpe:/a:apache:subversion:1.6.4", "cpe:/a:apache:subversion:0.32.1", "cpe:/a:apache:subversion:0.13.2", "cpe:/a:apache:subversion:0.14.3", "cpe:/a:apache:subversion:m2", "cpe:/a:apache:subversion:1.5.6", "cpe:/a:apache:subversion:1.5.2", "cpe:/a:apache:subversion:1.6.2", "cpe:/a:apache:subversion:0.10.1", "cpe:/a:apache:subversion:1.6.12", "cpe:/a:apache:subversion:0.28.0", "cpe:/a:apache:subversion:1.6.8", "cpe:/a:apache:subversion:0.24.1", "cpe:/a:apache:subversion:m1", "cpe:/a:apache:subversion:1.6.6", "cpe:/a:apache:subversion:1.6.11", "cpe:/a:apache:subversion:0.34.0", "cpe:/a:apache:subversion:1.1.0", "cpe:/a:apache:subversion:1.0.4", "cpe:/a:apache:subversion:1.6.3", "cpe:/a:apache:subversion:0.14.1", "cpe:/a:apache:subversion:0.10.0", "cpe:/a:apache:subversion:1.4.5", "cpe:/a:apache:subversion:0.31.0", "cpe:/a:apache:subversion:1.4.3", "cpe:/a:apache:subversion:0.20.1", "cpe:/a:apache:subversion:m4\\/m5", "cpe:/a:apache:subversion:1.4.4", "cpe:/a:apache:subversion:0.18.0", "cpe:/a:apache:subversion:0.22.1", "cpe:/a:apache:subversion:1.6.0", "cpe:/a:apache:subversion:1.5.5", "cpe:/a:apache:subversion:0.22.0"], "id": "CVE-2010-4539", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4539", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m4\\/m5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2022-07-15T06:03:30", "description": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.", "cvss3": {}, "published": "2011-01-07T19:00:00", "type": "debiancve", "title": "CVE-2010-4644", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4644"], "modified": "2011-01-07T19:00:00", "id": "DEBIANCVE:CVE-2010-4644", "href": "https://security-tracker.debian.org/tracker/CVE-2010-4644", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2022-07-15T06:03:30", "description": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.", "cvss3": {}, "published": "2011-01-07T19:00:00", "type": "debiancve", "title": "CVE-2010-4539", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539"], "modified": "2011-01-07T19:00:00", "id": "DEBIANCVE:CVE-2010-4539", "href": "https://security-tracker.debian.org/tracker/CVE-2010-4539", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "ubuntucve": [{"lastseen": "2022-08-04T14:34:58", "description": "Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15\nallow remote authenticated users to cause a denial of service (memory\nconsumption and daemon crash) via the -g option to the blame command.\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608989>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | PoC: http://svn.haxx.se/dev/archive-2010-11/0163.shtml hardy and older don't support -g, 1.5.x and higher only\n", "cvss3": {}, "published": "2011-01-07T00:00:00", "type": "ubuntucve", "title": "CVE-2010-4644", "bulletinFamily": "info", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4644"], "modified": "2011-01-07T00:00:00", "id": "UB:CVE-2010-4644", "href": "https://ubuntu.com/security/CVE-2010-4644", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2022-08-04T14:34:58", "description": "The walk function in repos.c in the mod_dav_svn module for the Apache HTTP\nServer, as distributed in Apache Subversion before 1.6.15, allows remote\nauthenticated users to cause a denial of service (NULL pointer dereference\nand daemon crash) via vectors that trigger the walking of SVNParentPath\ncollections.\n\n#### Bugs\n\n * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608989>\n * <https://bugzilla.redhat.com/show_bug.cgi?id=667407>\n\n\n#### Notes\n\nAuthor| Note \n---|--- \n[mdeslaur](<https://launchpad.net/~mdeslaur>) | in karmic and later, binary is libapache2-svn in universe\n", "cvss3": {}, "published": "2011-01-07T00:00:00", "type": "ubuntucve", "title": "CVE-2010-4539", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 6.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539"], "modified": "2011-01-07T00:00:00", "id": "UB:CVE-2010-4539", "href": "https://ubuntu.com/security/CVE-2010-4539", "cvss": {"score": 6.8, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:C"}}], "gentoo": [{"lastseen": "2022-01-17T19:10:48", "description": "### Background\n\nSubversion is a versioning system designed to be a replacement for CVS. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Subversion users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-vcs/subversion-1.7.13\"", "cvss3": {}, "published": "2013-09-23T00:00:00", "type": "gentoo", "title": "Subversion: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-4539", "CVE-2010-4644", "CVE-2011-0715", "CVE-2011-1752", "CVE-2011-1783", "CVE-2011-1921", "CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2013-1884", "CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112", "CVE-2013-4131", "CVE-2013-4277"], "modified": "2013-09-23T00:00:00", "id": "GLSA-201309-11", "href": "https://security.gentoo.org/glsa/201309-11", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}]}