Vulnerabilities > CVE-2011-0715 - Denial Of Service vulnerability in Subversion 'mod_dav_svn' Apache Server NULL Pointer Dereference

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
apache
nessus

Summary

The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'

Vulnerable Configurations

Part Description Count
Application
Apache
112

Nessus

  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201309-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201309-11 (Subversion: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id70084
    published2013-09-24
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70084
    titleGLSA-201309-11 : Subversion: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201309-11.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70084);
      script_version("1.7");
      script_cvs_date("Date: 2018/07/11 17:09:26");
    
      script_cve_id("CVE-2010-4539", "CVE-2010-4644", "CVE-2011-0715", "CVE-2011-1752", "CVE-2011-1783", "CVE-2011-1921", "CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2013-1884", "CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112", "CVE-2013-4131", "CVE-2013-4277");
      script_bugtraq_id(45655, 46734, 48091, 58323, 58895, 58896, 58897, 58898, 60264, 60265, 60267, 61454, 62266);
      script_xref(name:"GLSA", value:"201309-11");
    
      script_name(english:"GLSA-201309-11 : Subversion: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201309-11
    (Subversion: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Subversion. Please
          review the CVE identifiers referenced below for details.
      
    Impact :
    
        A remote attacker could cause a Denial of Service condition or obtain
          sensitive information. A local attacker could escalate his privileges to
          the user running svnserve.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201309-11"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Subversion users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-vcs/subversion-1.7.13'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/09/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/24");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-vcs/subversion", unaffected:make_list("ge 1.7.13"), vulnerable:make_list("lt 1.7.13"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Subversion");
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2011-004.NASL
    descriptionThe remote host is running a version of Mac OS X 10.5 that does not have Security Update 2011-004 applied. This update contains security- related fixes for the following components : - AirPort - App Store - ColorSync - CoreGraphics - ImageIO - Libsystem - libxslt - MySQL - patch - Samba - servermgrd - subversion
    last seen2020-06-01
    modified2020-06-02
    plugin id55415
    published2011-06-24
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55415
    titleMac OS X Multiple Vulnerabilities (Security Update 2011-004)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-067.NASL
    descriptionA vulnerability was discovered and corrected in subversion : The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token (CVE-2011-0715). Additionally for Corporate Server 4 and Enterprise Server 5 subversion have been upgraded to the 1.6.16 version due to of numerous upstream fixes and new features, the serf packages has also been upgraded to the now required 0.3.0 version. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been upgraded to the 1.6.16 version which is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id53309
    published2011-04-07
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/53309
    titleMandriva Linux Security Advisory : subversion (MDVSA-2011:067)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110308_SUBVERSION_ON_SL5_X.NASL
    descriptionA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) This update also fixes the following bug : - A regression was found in the handling of repositories which do not have a
    last seen2020-06-01
    modified2020-06-02
    plugin id60982
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60982
    titleScientific Linux Security Update : subversion on SL5.x i386/x86_64
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2181.NASL
    descriptionPhilip Martin discovered that HTTP-based Subversion servers crash when processing lock requests on repositories which support unauthenticated read access.
    last seen2020-03-17
    modified2011-03-07
    plugin id52548
    published2011-03-07
    reporterThis script is Copyright (C) 2011-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/52548
    titleDebian DSA-2181-1 : subversion - denial of service
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1096-1.NASL
    descriptionPhilip Martin discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain requests containing a lock token. A remote attacker could use this flaw to cause the service to crash, leading to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id53220
    published2011-03-30
    reporterUbuntu Security Notice (C) 2011-2019 Canonical, Inc. / NASL script (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/53220
    titleUbuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : subversion vulnerability (USN-1096-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CVS2SVN-7560.NASL
    descriptionSubversion was updated to fix several security issues : - The mod_dav_svn Apache HTTPD server module can be crashed though when asked to deliver baselined WebDAV resources. (CVE-2011-1752) - The mod_dav_svn Apache HTTPD server module can trigger a loop which consumes all available memory on the system. (CVE-2011-1783) - Remote attackers could crash an svn server by causing a NULL deref. (CVE-2011-0715)
    last seen2020-06-01
    modified2020-06-02
    plugin id57173
    published2011-12-13
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/57173
    titleSuSE 10 Security Update : subversion (ZYPP Patch Number 7560)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_4_LIBSVN_AUTH_GNOME_KEYRING-1-0-110309.NASL
    descriptionRemote attackers could crash an svn server by causing a NULL deref (CVE-2011-0715).
    last seen2020-06-01
    modified2020-06-02
    plugin id75922
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75922
    titleopenSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0238-1)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0328.NASL
    descriptionFrom Red Hat Security Advisory 2011:0328 : Updated subversion packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) Red Hat would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. All Subversion users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id68221
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68221
    titleOracle Linux 6 : subversion (ELSA-2011-0328)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-2657.NASL
    descriptionA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) The Fedora Project would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. Several bugs are also fixed in this update : - more improvement to the
    last seen2020-06-01
    modified2020-06-02
    plugin id52692
    published2011-03-17
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52692
    titleFedora 14 : subversion-1.6.16-1.fc14 (2011-2657)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0327.NASL
    descriptionUpdated subversion packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) Red Hat would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. This update also fixes the following bug : * A regression was found in the handling of repositories which do not have a
    last seen2020-06-01
    modified2020-06-02
    plugin id52594
    published2011-03-09
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/52594
    titleRHEL 5 : subversion (RHSA-2011:0327)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_E27CA763472111E0BDC4001E8C75030D.NASL
    descriptionSubversion project reports : Subversion HTTP servers up to 1.5.9 (inclusive) or 1.6.15 (inclusive) are vulnerable to a remotely triggerable NULL pointer dereference.
    last seen2020-06-01
    modified2020-06-02
    plugin id52563
    published2011-03-07
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/52563
    titleFreeBSD : subversion -- remote HTTP DoS vulnerability (e27ca763-4721-11e0-bdc4-001e8c75030d)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-3775.NASL
    descriptionA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) The Fedora Project would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. Several bugs are also fixed in this update : - more improvement to the
    last seen2020-06-01
    modified2020-06-02
    plugin id52985
    published2011-03-27
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52985
    titleFedora 15 : subversion-1.6.16-1.fc15 (2011-3775)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-0328.NASL
    descriptionUpdated subversion packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) Red Hat would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. All Subversion users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, you must restart the httpd daemon, if you are using mod_dav_svn, for the update to take effect.
    last seen2020-06-01
    modified2020-06-02
    plugin id52595
    published2011-03-09
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/52595
    titleRHEL 6 : subversion (RHSA-2011:0328)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_LIBSVN_AUTH_GNOME_KEYRING-1-0-110607.NASL
    description - CVE-2011-1752: The mod_dav_svn Apache HTTPD server module can be crashed though when asked to deliver baselined WebDAV resources. - CVE-2011-1783: The mod_dav_svn Apache HTTPD server module can trigger a loop which consumes all available memory on the system. - CVE-2011-1921: The mod_dav_svn Apache HTTPD server module may leak to remote users the file contents of files configured to be unreadable by those users. - CVE-2011-0715: Remote attackers could crash an svn server by causing a NULL deref
    last seen2020-06-01
    modified2020-06-02
    plugin id75617
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75617
    titleopenSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0693-1)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-0327.NASL
    descriptionUpdated subversion packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) Red Hat would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. This update also fixes the following bug : * A regression was found in the handling of repositories which do not have a
    last seen2020-06-01
    modified2020-06-02
    plugin id53425
    published2011-04-15
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/53425
    titleCentOS 5 : subversion (CESA-2011:0327)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_6_8.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.8. This update contains security-related fixes for the following components : - App Store - ATS - Certificate Trust Policy - CoreFoundation - CoreGraphics - FTP Server - ImageIO - International Components for Unicode - Kernel - Libsystem - libxslt - MobileMe - MySQL - OpenSSL - patch - QuickLook - QuickTime - Samba - servermgrd - subversion
    last seen2020-06-01
    modified2020-06-02
    plugin id55416
    published2011-06-24
    reporterThis script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55416
    titleMac OS X 10.6.x < 10.6.8 Multiple Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-2698.NASL
    descriptionA NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) The Fedora Project would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. Several bugs are also fixed in this update : - more improvement to the
    last seen2020-06-01
    modified2020-06-02
    plugin id52693
    published2011-03-17
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52693
    titleFedora 13 : subversion-1.6.16-1.fc13 (2011-2698)
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2011-070-01.NASL
    descriptionNew subversion packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id52635
    published2011-03-14
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52635
    titleSlackware 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : subversion (SSA:2011-070-01)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-0327.NASL
    descriptionFrom Red Hat Security Advisory 2011:0327 : Updated subversion packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module processed certain requests to lock working copy paths in a repository. A remote attacker could issue a lock request that could cause the httpd process serving the request to crash. (CVE-2011-0715) Red Hat would like to thank Hyrum Wright of the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin, WANdisco, Inc. as the original reporter. This update also fixes the following bug : * A regression was found in the handling of repositories which do not have a
    last seen2020-06-01
    modified2020-06-02
    plugin id68220
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68220
    titleOracle Linux 5 : subversion (ELSA-2011-0327)

Oval

accepted2015-05-04T04:00:12.671-04:00
classvulnerability
contributors
  • nameSergey Artykhov
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
commentVisualSVN Server is installed
ovaloval:org.mitre.oval:def:18636
descriptionThe mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
familywindows
idoval:org.mitre.oval:def:18967
statusaccepted
submitted2013-10-02T13:00:00
titleApache Subversion vulnerability before 1.6.16 in VisualSVN Server (CVE-2011-0715)
version8

Redhat

advisories
  • bugzilla
    id681522
    titleRegression: svnadmin hotcopy throws error
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentsubversion-ruby is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327001
          • commentsubversion-ruby is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039004
        • AND
          • commentsubversion-javahl is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327003
          • commentsubversion-javahl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039006
        • AND
          • commentsubversion is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327005
          • commentsubversion is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039010
        • AND
          • commentsubversion-devel is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327007
          • commentsubversion-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039008
        • AND
          • commentsubversion-perl is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327009
          • commentsubversion-perl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039012
        • AND
          • commentmod_dav_svn is earlier than 0:1.6.11-7.el5_6.3
            ovaloval:com.redhat.rhsa:tst:20110327011
          • commentmod_dav_svn is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhea:tst:20110039002
    rhsa
    idRHSA-2011:0327
    released2011-03-08
    severityModerate
    titleRHSA-2011:0327: subversion security and bug fix update (Moderate)
  • bugzilla
    id680755
    titleCVE-2011-0715 subversion (mod_dav_svn): DoS (NULL ptr deref) by a lock token sent from a not authenticated Subversion client
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentsubversion-svn2cl is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328001
          • commentsubversion-svn2cl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258002
        • AND
          • commentsubversion-javahl is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328003
          • commentsubversion-javahl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258008
        • AND
          • commentsubversion is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328005
          • commentsubversion is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258010
        • AND
          • commentsubversion-devel is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328007
          • commentsubversion-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258012
        • AND
          • commentsubversion-perl is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328009
          • commentsubversion-perl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258014
        • AND
          • commentsubversion-ruby is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328011
          • commentsubversion-ruby is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258016
        • AND
          • commentsubversion-gnome is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328013
          • commentsubversion-gnome is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258018
        • AND
          • commentsubversion-kde is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328015
          • commentsubversion-kde is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258004
        • AND
          • commentmod_dav_svn is earlier than 0:1.6.11-2.el6_0.3
            ovaloval:com.redhat.rhsa:tst:20110328017
          • commentmod_dav_svn is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20110258006
    rhsa
    idRHSA-2011:0328
    released2011-03-08
    severityModerate
    titleRHSA-2011:0328: subversion security update (Moderate)
rpms
  • mod_dav_svn-0:1.6.11-7.el5_6.3
  • subversion-0:1.6.11-7.el5_6.3
  • subversion-debuginfo-0:1.6.11-7.el5_6.3
  • subversion-devel-0:1.6.11-7.el5_6.3
  • subversion-javahl-0:1.6.11-7.el5_6.3
  • subversion-perl-0:1.6.11-7.el5_6.3
  • subversion-ruby-0:1.6.11-7.el5_6.3
  • mod_dav_svn-0:1.6.11-2.el6_0.3
  • subversion-0:1.6.11-2.el6_0.3
  • subversion-debuginfo-0:1.6.11-2.el6_0.3
  • subversion-devel-0:1.6.11-2.el6_0.3
  • subversion-gnome-0:1.6.11-2.el6_0.3
  • subversion-javahl-0:1.6.11-2.el6_0.3
  • subversion-kde-0:1.6.11-2.el6_0.3
  • subversion-perl-0:1.6.11-2.el6_0.3
  • subversion-ruby-0:1.6.11-2.el6_0.3
  • subversion-svn2cl-0:1.6.11-2.el6_0.3

References