Vulnerabilities > CVE-2013-2112 - Remote Denial of Service vulnerability in Apache Subversion

047910
CVSS 7.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
network
low complexity
apache
collabnet
canonical
opensuse
nessus

Summary

The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.

Vulnerable Configurations

Part Description Count
Application
Apache
124
Application
Collabnet
1
OS
Canonical
3
OS
Opensuse
1

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1893-1.NASL
    descriptionAlexander Klink discovered that the Subversion mod_dav_svn module for Apache did not properly handle a large number of properties. A remote authenticated attacker could use this flaw to cause memory consumption, leading to a denial of service. (CVE-2013-1845) Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote authenticated attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1846) Philip Martin and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain LOCKs. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1847) It was discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain PROPFIND requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-1849) Greg McMullin, Stefan Fuhrmann, Philip Martin, and Ben Reser discovered that the Subversion mod_dav_svn module for Apache did not properly handle certain log REPORT requests. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. This issue only affected Ubuntu 12.10 and Ubuntu 13.04. (CVE-2013-1884) Stefan Sperling discovered that Subversion incorrectly handled newline characters in filenames. A remote authenticated attacker could use this flaw to corrupt FSFS repositories. (CVE-2013-1968) Boris Lytochkin discovered that Subversion incorrectly handled TCP connections that were closed early. A remote attacker could use this flaw to cause Subversion to crash, leading to a denial of service. (CVE-2013-2112). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id67016
    published2013-06-28
    reporterUbuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67016
    titleUbuntu 12.04 LTS / 12.10 / 13.04 : subversion vulnerabilities (USN-1893-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-1893-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(67016);
      script_version("1.8");
      script_cvs_date("Date: 2019/09/19 12:54:29");
    
      script_cve_id("CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2013-1884", "CVE-2013-1968", "CVE-2013-2112");
      script_bugtraq_id(58323, 58895, 58896, 58897, 58898, 60264, 60267);
      script_xref(name:"USN", value:"1893-1");
    
      script_name(english:"Ubuntu 12.04 LTS / 12.10 / 13.04 : subversion vulnerabilities (USN-1893-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Alexander Klink discovered that the Subversion mod_dav_svn module for
    Apache did not properly handle a large number of properties. A remote
    authenticated attacker could use this flaw to cause memory
    consumption, leading to a denial of service. (CVE-2013-1845)
    
    Ben Reser discovered that the Subversion mod_dav_svn module for Apache
    did not properly handle certain LOCKs. A remote authenticated attacker
    could use this flaw to cause Subversion to crash, leading to a denial
    of service. (CVE-2013-1846)
    
    Philip Martin and Ben Reser discovered that the Subversion mod_dav_svn
    module for Apache did not properly handle certain LOCKs. A remote
    attacker could use this flaw to cause Subversion to crash, leading to
    a denial of service. (CVE-2013-1847)
    
    It was discovered that the Subversion mod_dav_svn module for Apache
    did not properly handle certain PROPFIND requests. A remote attacker
    could use this flaw to cause Subversion to crash, leading to a denial
    of service. (CVE-2013-1849)
    
    Greg McMullin, Stefan Fuhrmann, Philip Martin, and Ben Reser
    discovered that the Subversion mod_dav_svn module for Apache did not
    properly handle certain log REPORT requests. A remote attacker could
    use this flaw to cause Subversion to crash, leading to a denial of
    service. This issue only affected Ubuntu 12.10 and Ubuntu 13.04.
    (CVE-2013-1884)
    
    Stefan Sperling discovered that Subversion incorrectly handled newline
    characters in filenames. A remote authenticated attacker could use
    this flaw to corrupt FSFS repositories. (CVE-2013-1968)
    
    Boris Lytochkin discovered that Subversion incorrectly handled TCP
    connections that were closed early. A remote attacker could use this
    flaw to cause Subversion to crash, leading to a denial of service.
    (CVE-2013-2112).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/1893-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libapache2-svn and / or libsvn1 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libapache2-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsvn1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.10");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:13.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/28");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2013-2019 Canonical, Inc. / NASL script (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|12\.10|13\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 12.10 / 13.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libapache2-svn", pkgver:"1.6.17dfsg-3ubuntu3.3")) flag++;
    if (ubuntu_check(osver:"12.04", pkgname:"libsvn1", pkgver:"1.6.17dfsg-3ubuntu3.3")) flag++;
    if (ubuntu_check(osver:"12.10", pkgname:"libapache2-svn", pkgver:"1.7.5-1ubuntu2.1")) flag++;
    if (ubuntu_check(osver:"12.10", pkgname:"libsvn1", pkgver:"1.7.5-1ubuntu2.1")) flag++;
    if (ubuntu_check(osver:"13.04", pkgname:"libapache2-svn", pkgver:"1.7.5-1ubuntu3.1")) flag++;
    if (ubuntu_check(osver:"13.04", pkgname:"libsvn1", pkgver:"1.7.5-1ubuntu3.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libapache2-svn / libsvn1");
    }
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201309-11.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201309-11 (Subversion: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Subversion. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service condition or obtain sensitive information. A local attacker could escalate his privileges to the user running svnserve. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id70084
    published2013-09-24
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/70084
    titleGLSA-201309-11 : Subversion: Multiple vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201309-11.
    #
    # The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70084);
      script_version("1.7");
      script_cvs_date("Date: 2018/07/11 17:09:26");
    
      script_cve_id("CVE-2010-4539", "CVE-2010-4644", "CVE-2011-0715", "CVE-2011-1752", "CVE-2011-1783", "CVE-2011-1921", "CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2013-1884", "CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112", "CVE-2013-4131", "CVE-2013-4277");
      script_bugtraq_id(45655, 46734, 48091, 58323, 58895, 58896, 58897, 58898, 60264, 60265, 60267, 61454, 62266);
      script_xref(name:"GLSA", value:"201309-11");
    
      script_name(english:"GLSA-201309-11 : Subversion: Multiple vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201309-11
    (Subversion: Multiple vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Subversion. Please
          review the CVE identifiers referenced below for details.
      
    Impact :
    
        A remote attacker could cause a Denial of Service condition or obtain
          sensitive information. A local attacker could escalate his privileges to
          the user running svnserve.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201309-11"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Subversion users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-vcs/subversion-1.7.13'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/09/23");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/24");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-vcs/subversion", unaffected:make_list("ge 1.7.13"), vulnerable:make_list("lt 1.7.13"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Subversion");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2014-0255.NASL
    descriptionUpdated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A flaw was found in the way the mod_dav_svn module handled OPTIONS requests. A remote attacker with read access to an SVN repository served via HTTP could use this flaw to cause the httpd process that handled such a request to crash. (CVE-2014-0032) A flaw was found in the way Subversion handled file names with newline characters when the FSFS repository format was used. An attacker with commit access to an SVN repository could corrupt a revision by committing a specially crafted file. (CVE-2013-1968) A flaw was found in the way the svnserve tool of Subversion handled remote client network connections. An attacker with read access to an SVN repository served via svnserve could use this flaw to cause the svnserve daemon to exit, leading to a denial of service. (CVE-2013-2112) All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-04-16
    modified2014-03-06
    plugin id72854
    published2014-03-06
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72854
    titleRHEL 5 / 6 : subversion (RHSA-2014:0255)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:0255. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72854);
      script_version("1.13");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/15");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112", "CVE-2014-0032");
      script_bugtraq_id(60264, 60267, 65434);
      script_xref(name:"RHSA", value:"2014:0255");
    
      script_name(english:"RHEL 5 / 6 : subversion (RHSA-2014:0255)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    Moderate security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    A flaw was found in the way the mod_dav_svn module handled OPTIONS
    requests. A remote attacker with read access to an SVN repository
    served via HTTP could use this flaw to cause the httpd process that
    handled such a request to crash. (CVE-2014-0032)
    
    A flaw was found in the way Subversion handled file names with newline
    characters when the FSFS repository format was used. An attacker with
    commit access to an SVN repository could corrupt a revision by
    committing a specially crafted file. (CVE-2013-1968)
    
    A flaw was found in the way the svnserve tool of Subversion handled
    remote client network connections. An attacker with read access to an
    SVN repository served via svnserve could use this flaw to cause the
    svnserve daemon to exit, leading to a denial of service.
    (CVE-2013-2112)
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2014-0032-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2013-1968-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2013-2112-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2014:0255"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-2112"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2014-0032"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2013-1968"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.5");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/03/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2014:0255";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"subversion-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"subversion-debuginfo-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", reference:"subversion-devel-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
    
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-debuginfo-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-devel-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-gnome-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-javahl-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-kde-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-perl-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-ruby-1.6.11-10.el6_5")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-svn2cl-1.6.11-10.el6_5")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_HOLE,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
      }
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2703.NASL
    descriptionSeveral vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2013-1968 Subversion repositories with the FSFS repository data store format can be corrupted by newline characters in filenames. A remote attacker with a malicious client could use this flaw to disrupt the service for other users using that repository. - CVE-2013-2112 Subversion
    last seen2020-03-17
    modified2013-06-10
    plugin id66846
    published2013-06-10
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66846
    titleDebian DSA-2703-1 : subversion - several vulnerabilities
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-2703. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66846);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112");
      script_bugtraq_id(60264, 60267);
      script_xref(name:"DSA", value:"2703");
    
      script_name(english:"Debian DSA-2703-1 : subversion - several vulnerabilities");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities were discovered in Subversion, a version
    control system. The Common Vulnerabilities and Exposures project
    identifies the following problems :
    
      - CVE-2013-1968
        Subversion repositories with the FSFS repository data
        store format can be corrupted by newline characters in
        filenames. A remote attacker with a malicious client
        could use this flaw to disrupt the service for other
        users using that repository.
    
      - CVE-2013-2112
        Subversion's svnserve server process may exit when an
        incoming TCP connection is closed early in the
        connection process. A remote attacker can cause svnserve
        to exit and thus deny service to users of the server."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711033"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-1968"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2013-2112"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/squeeze/subversion"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/subversion"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2013/dsa-2703"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the subversion packages.
    
    For the oldstable distribution (squeeze), these problems have been
    fixed in version 1.6.12dfsg-7.
    
    For the stable distribution (wheezy), these problems have been fixed
    in version 1.6.17dfsg-4+deb7u3."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/09");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/10");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"6.0", prefix:"libapache2-svn", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-dev", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-doc", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-java", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-perl", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-ruby", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-ruby1.8", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn1", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"python-subversion", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"subversion", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"6.0", prefix:"subversion-tools", reference:"1.6.12dfsg-7")) flag++;
    if (deb_check(release:"7.0", prefix:"libapache2-svn", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-dev", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-doc", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-java", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-perl", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-ruby", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-ruby1.8", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn1", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"python-subversion", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"subversion", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    if (deb_check(release:"7.0", prefix:"subversion-tools", reference:"1.6.17dfsg-4+deb7u3")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2013-1217-1.NASL
    descriptionThis update of subversion fixes two potential DoS vulnerabilities (bug#821505, CVE-2013-1968, CVE-2013-2112). Server-side bugfixes : - fix FSFS repository corruption due to newline in filename (issue #4340) - fix svnserve exiting when a client connection is aborted (r1482759) Other tool improvements and bugfixes : - fix argument processing in contrib hook scripts (r1485350) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-05-20
    plugin id83592
    published2015-05-20
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83592
    titleSUSE SLED10 Security Update : subversion (SUSE-SU-2013:1217-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from SUSE update advisory SUSE-SU-2013:1217-1.
    # The text itself is copyright (C) SUSE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83592);
      script_version("2.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112");
      script_bugtraq_id(60264, 60267);
    
      script_name(english:"SUSE SLED10 Security Update : subversion (SUSE-SU-2013:1217-1)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SUSE host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update of subversion fixes two potential DoS vulnerabilities
    (bug#821505, CVE-2013-1968, CVE-2013-2112).
    
    Server-side bugfixes :
    
       - fix FSFS repository corruption due to newline in
        filename (issue #4340)
      - fix svnserve exiting when a client connection is aborted
        (r1482759) Other tool improvements and bugfixes :
    
       - fix argument processing in contrib hook scripts
        (r1485350)
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the SUSE security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # http://download.suse.com/patch/finder/?keywords=36021bc879cc7c6cd3d36b5f76b9c22d
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?501be5d2"
      );
      # http://download.suse.com/patch/finder/?keywords=64648aca6f33898d15cd8c0c4956232f
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?e80f83c7"
      );
      # http://download.suse.com/patch/finder/?keywords=f1e3ccee3d6965d85d10d4c4ff3e6746
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?f32d4b52"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2013-1968.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2013-2112.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/821505"
      );
      # https://www.suse.com/support/update/announcement/2013/suse-su-20131217-1.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?68bac0d0"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product :
    
    SUSE Studio Onsite 1.3 :
    
    zypper in -t patch slestso13-subversion-7930
    
    SUSE Linux Enterprise Software Development Kit 11 SP3 :
    
    zypper in -t patch sdksp3-subversion-7933
    
    SUSE Linux Enterprise Software Development Kit 11 SP2 :
    
    zypper in -t patch sdksp2-subversion-7930
    
    To bring your system up-to-date, use 'zypper patch'."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:10");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/05/20");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
    os_ver = eregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^(SLED10)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLED10", "SUSE " + os_ver);
    
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
    if (cpu >!< "i386|i486|i586|i686|x86_64") audit(AUDIT_ARCH_NOT, "i386 / i486 / i586 / i686 / x86_64", cpu);
    
    
    sp = get_kb_item("Host/SuSE/patchlevel");
    if (isnull(sp)) sp = "0";
    if (os_ver == "SLED10" && (! ereg(pattern:"^4$", string:sp))) audit(AUDIT_OS_NOT, "SLED10 SP4", os_ver + " SP" + sp);
    
    
    flag = 0;
    if (rpm_check(release:"SLED10", sp:"4", cpu:"x86_64", reference:"subversion-1.3.1-1.24.1")) flag++;
    if (rpm_check(release:"SLED10", sp:"4", cpu:"x86_64", reference:"subversion-devel-1.3.1-1.24.1")) flag++;
    if (rpm_check(release:"SLED10", sp:"4", cpu:"i586", reference:"subversion-1.3.1-1.24.1")) flag++;
    if (rpm_check(release:"SLED10", sp:"4", cpu:"i586", reference:"subversion-devel-1.3.1-1.24.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "subversion");
    }
    
  • NASL familyWindows
    NASL idSUBVERSION_1_6_23.NASL
    descriptionThe installed version of Apache Subversion Server is prior to 1.6.23 or 1.7.x prior to 1.7.10. It is, therefore, affected by multiple remote denial of service vulnerabilities : - A flaw exists when handling specially crafted filenames that could result in corruption of the FSFS repository. A workaround exists to install a pre-commit hook that will prevent unsanitized filenames from being committed into the repository. (CVE-2013-1968) - A flaw exists in svnserve server where improperly handled aborted connection message are handled as critical errors. (CVE-2013-2112)
    last seen2020-06-01
    modified2020-06-02
    plugin id68930
    published2013-07-17
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68930
    titleApache Subversion < 1.6.23 / 1.7.x < 1.7.10 Multiple Remote DoS
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(68930);
      script_version("1.6");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112");
      script_bugtraq_id(60264, 60267);
    
      script_name(english:"Apache Subversion < 1.6.23 / 1.7.x < 1.7.10 Multiple Remote DoS");
      script_summary(english:"Checks Apache Subversion Server version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has an application that is affected by multiple denial
    of service vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The installed version of Apache Subversion Server is prior to 1.6.23
    or 1.7.x prior to 1.7.10. It is, therefore, affected by multiple
    remote denial of service vulnerabilities :
    
      - A flaw exists when handling specially crafted filenames
        that could result in corruption of the FSFS repository.
        A workaround exists to install a pre-commit hook that
        will prevent unsanitized filenames from being committed
        into the repository. (CVE-2013-1968)
    
      - A flaw exists in svnserve server where improperly
        handled aborted connection message are handled as
        critical errors. (CVE-2013-2112)");
      script_set_attribute(attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2013-1968-advisory.txt");
      script_set_attribute(attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2013-2112-advisory.txt");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apache Subversion Server 1.6.23 / 1.7.10 / 1.8.0 or later
    or apply the vendor patches or workarounds.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1968");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/05/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/17");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apache:subversion");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("subversion_installed.nasl");
      script_require_keys("installed_sw/Subversion Server", "Settings/ParanoidReport");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    appname = 'Subversion Server';
    install = get_single_install(app_name:appname, exit_if_unknown_ver:TRUE);
    
    path     = install['path'];
    version  = install['version'];
    provider = install['Packaged with'];
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    if (
      ver_compare(ver:version, fix:'1.6.23', strict:FALSE) == -1 ||
      (ver_compare(ver:version, fix:'1.7.0', strict:FALSE) >= 0 && ver_compare(ver:version, fix:'1.7.10', strict:FALSE) == -1)
    )
    {
      port = get_kb_item("SMB/transport");
      if (!port) port = 445;
    
      if (report_verbosity > 0)
      {
        report = '\n  Path              : ' + path +
                 '\n  Packaged with     : ' + provider +
                 '\n  Installed version : ' + version +
                 '\n  Fixed versions    : 1.6.23 / 1.7.10 / 1.8.0' +
                 '\n';
        security_warning(port:port, extra:report);
      }
      else security_warning(port);
      exit(0);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, provider + ' ' + appname, version, path);
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2014-0255.NASL
    descriptionUpdated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A flaw was found in the way the mod_dav_svn module handled OPTIONS requests. A remote attacker with read access to an SVN repository served via HTTP could use this flaw to cause the httpd process that handled such a request to crash. (CVE-2014-0032) A flaw was found in the way Subversion handled file names with newline characters when the FSFS repository format was used. An attacker with commit access to an SVN repository could corrupt a revision by committing a specially crafted file. (CVE-2013-1968) A flaw was found in the way the svnserve tool of Subversion handled remote client network connections. An attacker with read access to an SVN repository served via svnserve could use this flaw to cause the svnserve daemon to exit, leading to a denial of service. (CVE-2013-2112) All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id72866
    published2014-03-07
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72866
    titleCentOS 5 / 6 : subversion (CESA-2014:0255)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2014:0255 and 
    # CentOS Errata and Security Advisory 2014:0255 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72866);
      script_version("1.8");
      script_cvs_date("Date: 2020/01/06");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112", "CVE-2014-0032");
      script_bugtraq_id(60264, 60267, 65434);
      script_xref(name:"RHSA", value:"2014:0255");
    
      script_name(english:"CentOS 5 / 6 : subversion (CESA-2014:0255)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    Moderate security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    A flaw was found in the way the mod_dav_svn module handled OPTIONS
    requests. A remote attacker with read access to an SVN repository
    served via HTTP could use this flaw to cause the httpd process that
    handled such a request to crash. (CVE-2014-0032)
    
    A flaw was found in the way Subversion handled file names with newline
    characters when the FSFS repository format was used. An attacker with
    commit access to an SVN repository could corrupt a revision by
    committing a specially crafted file. (CVE-2013-1968)
    
    A flaw was found in the way the svnserve tool of Subversion handled
    remote client network connections. An attacker with read access to an
    SVN repository served via svnserve could use this flaw to cause the
    svnserve daemon to exit, leading to a denial of service.
    (CVE-2013-2112)
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      # https://lists.centos.org/pipermail/centos-announce/2014-March/020189.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?01ae660a"
      );
      # https://lists.centos.org/pipermail/centos-announce/2014-March/020190.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?0971779c"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-2112");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/03/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/07");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 5.x / 6.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-5", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"CentOS-5", reference:"subversion-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"CentOS-5", reference:"subversion-devel-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"CentOS-5", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"CentOS-5", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"CentOS-5", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
    if (rpm_check(release:"CentOS-6", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-devel-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-gnome-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-javahl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-kde-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-perl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-ruby-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-svn2cl-1.6.11-10.el6_5")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2013-13672.NASL
    descriptionThis update includes the latest release of Apache Subversion 1.7, version 1.7.11. Several security vulnerabilities are fixed in this update : Subversion
    last seen2020-03-17
    modified2013-08-15
    plugin id69355
    published2013-08-15
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69355
    titleFedora 18 : subversion-1.7.11-1.fc18.1 (2013-13672)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2013-13672.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69355);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112", "CVE-2013-4131");
      script_xref(name:"FEDORA", value:"2013-13672");
    
      script_name(english:"Fedora 18 : subversion-1.7.11-1.fc18.1 (2013-13672)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update includes the latest release of Apache Subversion 1.7,
    version 1.7.11. Several security vulnerabilities are fixed in this
    update :
    
    Subversion's mod_dav_svn Apache HTTPD server module will trigger an
    assertion on some requests made against a revision root. This can lead
    to a DoS. If assertions are disabled it will trigger a read overflow
    which may cause a segmentation fault or undefined behavior. Commit
    access is required to exploit this. (CVE-2013-4131)
    
    If a filename which contains a newline character (ASCII 0x0a) is
    committed to a repository using the FSFS format, the resulting
    revision is corrupt. This can lead to disruption for users of the
    repository. (CVE-2013-1968)
    
    Subversion's contrib/ directory contains two example hook scripts,
    which use 'svnlook changed' to examine a revision or transaction and
    then pass those paths as arguments to further 'svnlook' commands,
    without properly escaping the command-line. (CVE-2013-2088)
    
    Subversion's svnserve server process may exit when an incoming TCP
    connection is closed early in the connection process. This can lead to
    disruption for users of the server. (CVE-2013-2112)
    
    The following client-side bugs were fixed in the 1.7.10 release :
    
      - fix 'svn revert' 'no such table: revert_list' spurious
        error
    
        - fix 'svn diff' doesn't show some locally added files
    
        - fix changelist filtering when --changelist values
          aren't UTF8
    
        - fix 'svn diff --git' shows wrong copyfrom
    
        - fix 'svn diff -x-w' shows wrong changes
    
        - fix 'svn blame' sometimes shows every line as modified
    
        - fix regression in 'svn status -u' output for externals
    
        - fix file permissions change on commit of file with
          keywords
    
        - improve some fatal error messages
    
        - fix externals not removed when working copy is made
          shallow
    
    The following server-side bugs are fixed :
    
      - fix repository corruption due to newline in filename
    
        - fix svnserve exiting when a client connection is
          aborted
    
        - fix svnserve memory use after clear
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=970014"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=970027"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=970037"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=986194"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2013-August/113943.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fb0cfdf6"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:18");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/07/26");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/08/15");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^18([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 18.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC18", reference:"subversion-1.7.11-1.fc18.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "subversion");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2013-494.NASL
    descriptionThis update of subversion includes several bug and security fixes. - update to 1.7.10 [bnc#821505] CVE-2013-1968 CVE-2013-2088 CVE-2013-2112 - Client-side bugfixes : - fix
    last seen2020-06-05
    modified2014-06-13
    plugin id75035
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75035
    titleopenSUSE Security Update : subversion (openSUSE-SU-2013:1006-1)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2013-494.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(75035);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2088", "CVE-2013-2112");
      script_bugtraq_id(60264, 60265, 60267);
    
      script_name(english:"openSUSE Security Update : subversion (openSUSE-SU-2013:1006-1)");
      script_summary(english:"Check for the openSUSE-2013-494 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update of subversion includes several bug and security fixes.
    
      - update to 1.7.10 [bnc#821505] CVE-2013-1968
        CVE-2013-2088 CVE-2013-2112
    
      - Client-side bugfixes :
    
      - fix 'svn revert' 'no such table: revert_list' spurious
        error
    
      - fix 'svn diff' doesn't show some locally added files
    
      - fix changelist filtering when --changelist values aren't
        UTF8
    
      - fix 'svn diff --git' shows wrong copyfrom
    
      - fix 'svn diff -x-w' shows wrong changes
    
      - fix 'svn blame' sometimes shows every line as modified
    
      - fix regression in 'svn status -u' output for externals
    
      - fix file permissions change on commit of file with
        keywords
    
      - improve some fatal error messages
    
      - fix externals not removed when working copy is made
        shallow
    
      - Server-side bugfixes :
    
      - fix repository corruption due to newline in filename
    
      - fix svnserve exiting when a client connection is aborted
    
      - fix svnserve memory use after clear
    
      - fix repository corruption on power/disk failure on
        Windows
    
      - Developer visible changes :
    
      - make get-deps.sh compatible with Solaris /bin/sh
    
      - fix infinite recursion bug in get-deps.sh
    
      - fix uninitialised output parameter of
        svn_fs_commit_txn()
    
      - Bindings :
    
      - fix JavaHL thread-safety bug"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=821505"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.opensuse.org/opensuse-updates/2013-06/msg00136.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-bash-completion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/04");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE12\.2|SUSE12\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.2 / 12.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE12.2", reference:"libsvn_auth_gnome_keyring-1-0-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"libsvn_auth_kwallet-1-0-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-bash-completion-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-debugsource-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-devel-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-perl-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-perl-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-python-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-python-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-server-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-server-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-tools-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.2", reference:"subversion-tools-debuginfo-1.7.10-4.16.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"libsvn_auth_gnome_keyring-1-0-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"libsvn_auth_kwallet-1-0-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-bash-completion-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-debugsource-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-devel-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-perl-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-perl-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-python-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-python-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-server-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-server-debuginfo-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-tools-1.7.10-2.8.1") ) flag++;
    if ( rpm_check(release:"SUSE12.3", reference:"subversion-tools-debuginfo-1.7.10-2.8.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsvn_auth_gnome_keyring-1-0 / etc");
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-173.NASL
    descriptionMultiple vulnerabilities has been found and corrected in subversion : If a filename which contains a newline character (ASCII 0x0a) is committed to a repository using the FSFS format, the resulting revision is corrupt. This can lead to disruption for users of the repository (CVE-2013-1968). Subversion
    last seen2020-06-01
    modified2020-06-02
    plugin id66890
    published2013-06-14
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66890
    titleMandriva Linux Security Advisory : subversion (MDVSA-2013:173)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2013:173. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66890);
      script_version("1.7");
      script_cvs_date("Date: 2019/08/02 13:32:55");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112");
      script_bugtraq_id(60264, 60267);
      script_xref(name:"MDVSA", value:"2013:173");
    
      script_name(english:"Mandriva Linux Security Advisory : subversion (MDVSA-2013:173)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple vulnerabilities has been found and corrected in subversion :
    
    If a filename which contains a newline character (ASCII 0x0a) is
    committed to a repository using the FSFS format, the resulting
    revision is corrupt. This can lead to disruption for users of the
    repository (CVE-2013-1968).
    
    Subversion's svnserve server process may exit when an incoming TCP
    connection is closed early in the connection process. This can lead to
    disruption for users of the server (CVE-2013-2112).
    
    This advisory provides the latest versions of subversion
    (1.6.23/1.7.10) which is not vulnerable to these issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2013-1968-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2013-2112-advisory.txt"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:apache-mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svnjavahl1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-SVN");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-gnome-keyring-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:svn-javahl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"apache-mod_dav_svn-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn-gnome-keyring0-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn0-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svnjavahl1-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-SVN-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-svn-devel-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-devel-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-devel-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-devel-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-doc-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-gnome-keyring-devel-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-server-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-tools-1.7.10-0.1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"svn-javahl-1.7.10-0.1.mbs1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20140305_SUBVERSION_ON_SL5_X.NASL
    descriptionA flaw was found in the way the mod_dav_svn module handled OPTIONS requests. A remote attacker with read access to an SVN repository served via HTTP could use this flaw to cause the httpd process that handled such a request to crash. (CVE-2014-0032) A flaw was found in the way Subversion handled file names with newline characters when the FSFS repository format was used. An attacker with commit access to an SVN repository could corrupt a revision by committing a specially crafted file. (CVE-2013-1968) A flaw was found in the way the svnserve tool of Subversion handled remote client network connections. An attacker with read access to an SVN repository served via svnserve could use this flaw to cause the svnserve daemon to exit, leading to a denial of service. (CVE-2013-2112) After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-03-18
    modified2014-03-06
    plugin id72855
    published2014-03-06
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72855
    titleScientific Linux Security Update : subversion on SL5.x, SL6.x i386/x86_64 (20140305)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72855);
      script_version("1.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112", "CVE-2014-0032");
    
      script_name(english:"Scientific Linux Security Update : subversion on SL5.x, SL6.x i386/x86_64 (20140305)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A flaw was found in the way the mod_dav_svn module handled OPTIONS
    requests. A remote attacker with read access to an SVN repository
    served via HTTP could use this flaw to cause the httpd process that
    handled such a request to crash. (CVE-2014-0032)
    
    A flaw was found in the way Subversion handled file names with newline
    characters when the FSFS repository format was used. An attacker with
    commit access to an SVN repository could corrupt a revision by
    committing a specially crafted file. (CVE-2013-1968)
    
    A flaw was found in the way the svnserve tool of Subversion handled
    remote client network connections. An attacker with read access to an
    SVN repository served via svnserve could use this flaw to cause the
    svnserve daemon to exit, leading to a denial of service.
    (CVE-2013-2112)
    
    After installing the updated packages, for the update to take effect,
    you must restart the httpd daemon, if you are using mod_dav_svn, and
    the svnserve daemon, if you are serving Subversion repositories via
    the svn:// protocol."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1403&L=scientific-linux-errata&T=0&P=451
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?038f3056"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/03/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 6.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL5", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-debuginfo-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-devel-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"SL5", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
    if (rpm_check(release:"SL6", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-debuginfo-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-devel-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-gnome-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-javahl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-kde-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-perl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-ruby-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-svn2cl-1.6.11-10.el6_5")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_CE502902CA3911E29673001E8C75030D.NASL
    descriptionSubversion team reports : Subversion
    last seen2020-06-01
    modified2020-06-02
    plugin id66738
    published2013-06-02
    reporterThis script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/66738
    titleFreeBSD : devel/subversion -- svnserve remotely triggerable DoS (ce502902-ca39-11e2-9673-001e8c75030d)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(66738);
      script_version("1.4");
      script_cvs_date("Date: 2018/11/10 11:49:43");
    
      script_cve_id("CVE-2013-2112");
    
      script_name(english:"FreeBSD : devel/subversion -- svnserve remotely triggerable DoS (ce502902-ca39-11e2-9673-001e8c75030d)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Subversion team reports :
    
    Subversion's svnserve server process may exit when an incoming TCP
    connection is closed early in the connection process."
      );
      # https://vuxml.freebsd.org/freebsd/ce502902-ca39-11e2-9673-001e8c75030d.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?dbe8335f"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/05/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"subversion>=1.7.0<1.7.10")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"subversion>=1.0.0<1.6.23")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CVS2SVN-8628.NASL
    descriptionThis update of subversion fixes two potential DoS vulnerabilities (bug#821505, CVE-2013-1968 / CVE-2013-2112). - Server-side bugfixes : - fix FSFS repository corruption due to newline in filename (issue #4340) - fix svnserve exiting when a client connection is aborted (r1482759) - Other tool improvements and bugfixes : - fix argument processing in contrib hook scripts (r1485350)
    last seen2020-06-05
    modified2013-07-18
    plugin id68955
    published2013-07-18
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/68955
    titleSuSE 10 Security Update : subversion (ZYPP Patch Number 8628)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The text description of this plugin is (C) Novell, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(68955);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112");
    
      script_name(english:"SuSE 10 Security Update : subversion (ZYPP Patch Number 8628)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 10 host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update of subversion fixes two potential DoS vulnerabilities
    (bug#821505, CVE-2013-1968 / CVE-2013-2112).
    
      - Server-side bugfixes :
    
      - fix FSFS repository corruption due to newline in
        filename (issue #4340)
    
      - fix svnserve exiting when a client connection is aborted
        (r1482759)
    
      - Other tool improvements and bugfixes :
    
      - fix argument processing in contrib hook scripts
        (r1485350)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2013-1968.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2013-2112.html"
      );
      script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 8628.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/18");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
    if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
    if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
    
    
    flag = 0;
    if (rpm_check(release:"SLED10", sp:4, reference:"subversion-1.3.1-1.24.1")) flag++;
    if (rpm_check(release:"SLED10", sp:4, reference:"subversion-devel-1.3.1-1.24.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else exit(0, "The host is not affected.");
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2014-0255.NASL
    descriptionFrom Red Hat Security Advisory 2014:0255 : Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A flaw was found in the way the mod_dav_svn module handled OPTIONS requests. A remote attacker with read access to an SVN repository served via HTTP could use this flaw to cause the httpd process that handled such a request to crash. (CVE-2014-0032) A flaw was found in the way Subversion handled file names with newline characters when the FSFS repository format was used. An attacker with commit access to an SVN repository could corrupt a revision by committing a specially crafted file. (CVE-2013-1968) A flaw was found in the way the svnserve tool of Subversion handled remote client network connections. An attacker with read access to an SVN repository served via svnserve could use this flaw to cause the svnserve daemon to exit, leading to a denial of service. (CVE-2013-2112) All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id72852
    published2014-03-06
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/72852
    titleOracle Linux 5 / 6 : subversion (ELSA-2014-0255)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2014:0255 and 
    # Oracle Linux Security Advisory ELSA-2014-0255 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(72852);
      script_version("1.8");
      script_cvs_date("Date: 2019/09/30 10:58:18");
    
      script_cve_id("CVE-2013-1968", "CVE-2013-2112", "CVE-2014-0032");
      script_bugtraq_id(60264, 60267, 65434);
      script_xref(name:"RHSA", value:"2014:0255");
    
      script_name(english:"Oracle Linux 5 / 6 : subversion (ELSA-2014-0255)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2014:0255 :
    
    Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 5 and 6.
    
    The Red Hat Security Response Team has rated this update as having
    Moderate security impact. Common Vulnerability Scoring System (CVSS)
    base scores, which give detailed severity ratings, are available for
    each vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    A flaw was found in the way the mod_dav_svn module handled OPTIONS
    requests. A remote attacker with read access to an SVN repository
    served via HTTP could use this flaw to cause the httpd process that
    handled such a request to crash. (CVE-2014-0032)
    
    A flaw was found in the way Subversion handled file names with newline
    characters when the FSFS repository format was used. An attacker with
    commit access to an SVN repository could corrupt a revision by
    committing a specially crafted file. (CVE-2013-1968)
    
    A flaw was found in the way the svnserve tool of Subversion handled
    remote client network connections. An attacker with read access to an
    SVN repository served via svnserve could use this flaw to cause the
    svnserve daemon to exit, leading to a denial of service.
    (CVE-2013-2112)
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2014-March/004001.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2014-March/004002.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/07/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2014/03/06");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/03/06");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 5 / 6", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL5", reference:"mod_dav_svn-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"EL5", reference:"subversion-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"EL5", reference:"subversion-devel-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"EL5", reference:"subversion-javahl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"EL5", reference:"subversion-perl-1.6.11-12.el5_10")) flag++;
    if (rpm_check(release:"EL5", reference:"subversion-ruby-1.6.11-12.el5_10")) flag++;
    
    if (rpm_check(release:"EL6", reference:"mod_dav_svn-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-devel-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-gnome-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-javahl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-kde-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-perl-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-ruby-1.6.11-10.el6_5")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-svn2cl-1.6.11-10.el6_5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    

Oval

accepted2015-05-04T04:00:14.437-04:00
classvulnerability
contributors
  • nameSergey Artykhov
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
commentVisualSVN Server is installed
ovaloval:org.mitre.oval:def:18636
descriptionThe svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
familywindows
idoval:org.mitre.oval:def:19057
statusaccepted
submitted2013-10-02T13:00:00
titleApache Subversion vulnerability 1.6.0 before 1.6.23 and 1.7.x before 1.7.10 in VisualSVN Server (CVE-2013-2112)
version8

Redhat

advisories
rhsa
idRHSA-2014:0255
rpms
  • mod_dav_svn-0:1.6.11-10.el6_5
  • mod_dav_svn-0:1.6.11-12.el5_10
  • subversion-0:1.6.11-10.el6_5
  • subversion-0:1.6.11-12.el5_10
  • subversion-debuginfo-0:1.6.11-10.el6_5
  • subversion-debuginfo-0:1.6.11-12.el5_10
  • subversion-devel-0:1.6.11-10.el6_5
  • subversion-devel-0:1.6.11-12.el5_10
  • subversion-gnome-0:1.6.11-10.el6_5
  • subversion-javahl-0:1.6.11-10.el6_5
  • subversion-javahl-0:1.6.11-12.el5_10
  • subversion-kde-0:1.6.11-10.el6_5
  • subversion-perl-0:1.6.11-10.el6_5
  • subversion-perl-0:1.6.11-12.el5_10
  • subversion-ruby-0:1.6.11-10.el6_5
  • subversion-ruby-0:1.6.11-12.el5_10
  • subversion-svn2cl-0:1.6.11-10.el6_5