Vulnerabilities > CVE-2015-0202 - Resource Management Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 12 | |
OS | 2 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-2721-1.NASL description It was discovered that the Subversion mod_dav_svn module incorrectly handled REPORT requests for a resource that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3580) It was discovered that the Subversion mod_dav_svn module incorrectly handled requests requiring a lookup for a virtual transaction name that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-8108) Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly handled large numbers of REPORT requests. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202) Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve modules incorrectly certain crafted parameter combinations. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2015-0248) Ivan Zhakov discovered that the Subversion mod_dav_svn module incorrectly handled crafted v1 HTTP protocol request sequences. A remote attacker could use this issue to spoof the svn:author property. (CVE-2015-0251) C. Michael Pilato discovered that the Subversion mod_dav_svn module incorrectly restricted anonymous access. A remote attacker could use this issue to read hidden files via the path name. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184) C. Michael Pilato discovered that Subversion incorrectly handled path-based authorization. A remote attacker could use this issue to obtain sensitive path information. (CVE-2015-3187). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 85579 published 2015-08-21 reporter Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85579 title Ubuntu 12.04 LTS / 14.04 LTS / 15.04 : subversion vulnerabilities (USN-2721-1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-2721-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(85579); script_version("2.6"); script_cvs_date("Date: 2019/09/18 12:31:44"); script_cve_id("CVE-2014-3580", "CVE-2014-8108", "CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187"); script_xref(name:"USN", value:"2721-1"); script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS / 15.04 : subversion vulnerabilities (USN-2721-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "It was discovered that the Subversion mod_dav_svn module incorrectly handled REPORT requests for a resource that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3580) It was discovered that the Subversion mod_dav_svn module incorrectly handled requests requiring a lookup for a virtual transaction name that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-8108) Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly handled large numbers of REPORT requests. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202) Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve modules incorrectly certain crafted parameter combinations. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2015-0248) Ivan Zhakov discovered that the Subversion mod_dav_svn module incorrectly handled crafted v1 HTTP protocol request sequences. A remote attacker could use this issue to spoof the svn:author property. (CVE-2015-0251) C. Michael Pilato discovered that the Subversion mod_dav_svn module incorrectly restricted anonymous access. A remote attacker could use this issue to read hidden files via the path name. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184) C. Michael Pilato discovered that Subversion incorrectly handled path-based authorization. A remote attacker could use this issue to obtain sensitive path information. (CVE-2015-3187). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/2721-1/" ); script_set_attribute( attribute:"solution", value: "Update the affected libapache2-svn, libsvn1 and / or subversion packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libapache2-svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsvn1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:subversion"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:15.04"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/18"); script_set_attribute(attribute:"patch_publication_date", value:"2015/08/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/21"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! preg(pattern:"^(12\.04|14\.04|15\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04 / 15.04", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"12.04", pkgname:"libapache2-svn", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"libsvn1", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++; if (ubuntu_check(osver:"12.04", pkgname:"subversion", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"libapache2-svn", pkgver:"1.8.8-1ubuntu3.2")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"libsvn1", pkgver:"1.8.8-1ubuntu3.2")) flag++; if (ubuntu_check(osver:"14.04", pkgname:"subversion", pkgver:"1.8.8-1ubuntu3.2")) flag++; if (ubuntu_check(osver:"15.04", pkgname:"libapache2-svn", pkgver:"1.8.10-5ubuntu1.1")) flag++; if (ubuntu_check(osver:"15.04", pkgname:"libsvn1", pkgver:"1.8.10-5ubuntu1.1")) flag++; if (ubuntu_check(osver:"15.04", pkgname:"subversion", pkgver:"1.8.10-5ubuntu1.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libapache2-svn / libsvn1 / subversion"); }
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2015-192.NASL description Multiple vulnerabilities has been discovered and corrected in subversion : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests (CVE-2015-0202). Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers (CVE-2015-0248). Subversion HTTP servers allow spoofing svn:author property values for new revisions (CVE-2015-0251). The updated packages have been upgraded to the 1.7.20 and 1.8.13 versions where these security flaws has been fixed. last seen 2020-06-01 modified 2020-06-02 plugin id 82563 published 2015-04-03 reporter This script is Copyright (C) 2015-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/82563 title Mandriva Linux Security Advisory : subversion (MDVSA-2015:192) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2015:192. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(82563); script_version("1.4"); script_cvs_date("Date: 2019/08/02 13:32:57"); script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251"); script_xref(name:"MDVSA", value:"2015:192"); script_name(english:"Mandriva Linux Security Advisory : subversion (MDVSA-2015:192)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Multiple vulnerabilities has been discovered and corrected in subversion : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests (CVE-2015-0202). Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers (CVE-2015-0248). Subversion HTTP servers allow spoofing svn:author property values for new revisions (CVE-2015-0251). The updated packages have been upgraded to the 1.7.20 and 1.8.13 versions where these security flaws has been fixed." ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:apache-mod_dav_svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svnjavahl1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-SVN"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-svn-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-gnome-keyring-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-server"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:svn-javahl"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:2"); script_set_attribute(attribute:"patch_publication_date", value:"2015/04/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/03"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"apache-mod_dav_svn-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn-gnome-keyring0-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn0-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svnjavahl1-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-SVN-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-svn-devel-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-devel-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-devel-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-devel-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-doc-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-gnome-keyring-devel-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-server-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-tools-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"svn-javahl-1.7.20-1.mbs1")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"apache-mod_dav_svn-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64svn0-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64svnjavahl1-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"perl-SVN-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"perl-svn-devel-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"python-svn-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"python-svn-devel-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"ruby-svn-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"ruby-svn-devel-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-devel-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-doc-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-server-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-tools-1.8.13-1.mbs2")) flag++; if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"svn-javahl-1.8.13-1.mbs2")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201610-05.NASL description The remote host is affected by the vulnerability described in GLSA-201610-05 (Subversion, Serf: Multiple Vulnerabilities) Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 93992 published 2016-10-12 reporter This script is Copyright (C) 2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/93992 title GLSA-201610-05 : Subversion, Serf: Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201610-05. # # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(93992); script_version("$Revision: 2.1 $"); script_cvs_date("$Date: 2016/10/12 13:47:11 $"); script_cve_id("CVE-2014-0032", "CVE-2014-3504", "CVE-2014-3522", "CVE-2014-3528", "CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187", "CVE-2015-5259", "CVE-2016-2167", "CVE-2016-2168"); script_xref(name:"GLSA", value:"201610-05"); script_name(english:"GLSA-201610-05 : Subversion, Serf: Multiple Vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201610-05 (Subversion, Serf: Multiple Vulnerabilities) Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201610-05" ); script_set_attribute( attribute:"solution", value: "All Subversion users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=dev-vcs/subversion-1.9.4' All Serf users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-libs/serf-1.3.7'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:serf"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:subversion"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2016/10/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/12"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2016 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"dev-vcs/subversion", unaffected:make_list("ge 1.9.4", "rgt 1.8.16"), vulnerable:make_list("lt 1.9.4"))) flag++; if (qpkg_check(package:"net-libs/serf", unaffected:make_list("ge 1.3.7"), vulnerable:make_list("lt 1.3.7"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Subversion / Serf"); }
NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2015-587.NASL description The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes. (CVE-2015-0202) An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) last seen 2020-06-01 modified 2020-06-02 plugin id 85632 published 2015-08-26 reporter This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/85632 title Amazon Linux AMI : subversion / mod_dav_svn (ALAS-2015-587) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Amazon Linux AMI Security Advisory ALAS-2015-587. # include("compat.inc"); if (description) { script_id(85632); script_version("2.2"); script_cvs_date("Date: 2018/04/18 15:09:35"); script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251"); script_xref(name:"ALAS", value:"2015-587"); script_name(english:"Amazon Linux AMI : subversion / mod_dav_svn (ALAS-2015-587)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Amazon Linux AMI host is missing a security update." ); script_set_attribute( attribute:"description", value: "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes. (CVE-2015-0202) An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251)" ); script_set_attribute( attribute:"see_also", value:"https://alas.aws.amazon.com/ALAS-2015-587.html" ); script_set_attribute( attribute:"solution", value:"Run 'yum update subversion mod_dav_svn' to update your system." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod24_dav_svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod_dav_svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod_dav_svn-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-javahl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-perl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-python26"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-python27"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-ruby"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-tools"); script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2015/08/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/26"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc."); script_family(english:"Amazon Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/AmazonLinux/release"); if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux"); os_ver = pregmatch(pattern: "^AL(A|\d)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux"); os_ver = os_ver[1]; if (os_ver != "A") { if (os_ver == 'A') os_ver = 'AMI'; audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver); } if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (rpm_check(release:"ALA", reference:"mod24_dav_svn-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"mod_dav_svn-1.8.13-7.50.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"mod_dav_svn-debuginfo-1.8.13-7.50.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-debuginfo-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-devel-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-javahl-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-libs-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-perl-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-python26-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-python27-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-ruby-1.8.13-7.52.amzn1")) flag++; if (rpm_check(release:"ALA", reference:"subversion-tools-1.8.13-7.52.amzn1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod24_dav_svn / mod_dav_svn / mod_dav_svn-debuginfo / subversion / etc"); }
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_8E887B71D76911E4B1C220CF30E32F6D.NASL description Subversion Project reports : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. Subversion HTTP servers allow spoofing svn:author property values for new revisions. last seen 2020-06-01 modified 2020-06-02 plugin id 82481 published 2015-04-01 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/82481 title FreeBSD : subversion -- DoS vulnerabilities (8e887b71-d769-11e4-b1c2-20cf30e32f6d) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the FreeBSD VuXML database : # # Copyright 2003-2018 Jacques Vidrine and contributors # # Redistribution and use in source (VuXML) and 'compiled' forms (SGML, # HTML, PDF, PostScript, RTF and so forth) with or without modification, # are permitted provided that the following conditions are met: # 1. Redistributions of source code (VuXML) must retain the above # copyright notice, this list of conditions and the following # disclaimer as the first lines of this file unmodified. # 2. Redistributions in compiled form (transformed to other DTDs, # published online in any format, converted to PDF, PostScript, # RTF and other formats) must reproduce the above copyright # notice, this list of conditions and the following disclaimer # in the documentation and/or other materials provided with the # distribution. # # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # include("compat.inc"); if (description) { script_id(82481); script_version("1.3"); script_cvs_date("Date: 2018/11/10 11:49:44"); script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251"); script_name(english:"FreeBSD : subversion -- DoS vulnerabilities (8e887b71-d769-11e4-b1c2-20cf30e32f6d)"); script_summary(english:"Checks for updated packages in pkg_info output"); script_set_attribute( attribute:"synopsis", value: "The remote FreeBSD host is missing one or more security-related updates." ); script_set_attribute( attribute:"description", value: "Subversion Project reports : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. Subversion HTTP servers allow spoofing svn:author property values for new revisions." ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/" ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0202-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0248-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"http://subversion.apache.org/security/CVE-2015-0251-advisory.txt" ); # https://vuxml.freebsd.org/freebsd/8e887b71-d769-11e4-b1c2-20cf30e32f6d.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9b6dfab2" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mod_dav_svn"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion16"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion17"); script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/03/31"); script_set_attribute(attribute:"patch_publication_date", value:"2015/03/31"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"FreeBSD Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info"); exit(0); } include("audit.inc"); include("freebsd_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD"); if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (pkg_test(save_report:TRUE, pkg:"mod_dav_svn>=1.5.0<1.7.20")) flag++; if (pkg_test(save_report:TRUE, pkg:"mod_dav_svn>=1.8.0<1.8.13")) flag++; if (pkg_test(save_report:TRUE, pkg:"subversion16>=1.0.0<1.7.20")) flag++; if (pkg_test(save_report:TRUE, pkg:"subversion17>=1.0.0<1.7.20")) flag++; if (pkg_test(save_report:TRUE, pkg:"subversion>=1.0.0<1.7.20")) flag++; if (pkg_test(save_report:TRUE, pkg:"subversion>=1.8.0<1.8.13")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Fedora Local Security Checks NASL id FEDORA_2015-11795.NASL description This update includes the latest stable release of **Apache Subversion**, version **1.8.13**. Three security vulnerabilities are fixed in this update : - CVE-2015-0202: https://subversion.apache.org/security/CVE-2015-0202-adv isory.txt - CVE-2015-0248: https://subversion.apache.org/security/CVE-2015-0248-a dvisory.txt - CVE-2015-0251: https://subversion.apache.org/security/CVE-2015-0251-a dvisory.txt In addition, the following changes are included in the Subversion 1.8.13 update : **Client-side bugfixes:** - ra_serf: prevent abort of commits that have already succeeded - ra_serf: support case-insensitivity in HTTP headers - better error message if an external is shadowed - ra_svn: fix reporting of directory read errors - fix a redirect handling bug in last seen 2020-06-05 modified 2015-07-29 plugin id 85065 published 2015-07-29 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/85065 title Fedora 21 : subversion-1.8.13-7.fc21 (2015-11795) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2015-11795. # include("compat.inc"); if (description) { script_id(85065); script_version("2.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251"); script_xref(name:"FEDORA", value:"2015-11795"); script_name(english:"Fedora 21 : subversion-1.8.13-7.fc21 (2015-11795)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update includes the latest stable release of **Apache Subversion**, version **1.8.13**. Three security vulnerabilities are fixed in this update : - CVE-2015-0202: https://subversion.apache.org/security/CVE-2015-0202-adv isory.txt - CVE-2015-0248: https://subversion.apache.org/security/CVE-2015-0248-a dvisory.txt - CVE-2015-0251: https://subversion.apache.org/security/CVE-2015-0251-a dvisory.txt In addition, the following changes are included in the Subversion 1.8.13 update : **Client-side bugfixes:** - ra_serf: prevent abort of commits that have already succeeded - ra_serf: support case-insensitivity in HTTP headers - better error message if an external is shadowed - ra_svn: fix reporting of directory read errors - fix a redirect handling bug in 'svn log' over HTTP - properly copy tree conflict information - fix 'svn patch' output for reordered hunks http://subversion.tigris.org/issues/show_bug.cgi?id=45 33 - svnrdump load: don't load wrong props with no-deltas dump http://subversion.tigris.org/issues/show_bug.cgi?id=45 51 - fix working copy corruption with relative file external http://subversion.tigris.org/issues/show_bug.cgi?id=44 11 - don't crash if config file is unreadable - svn resolve: don't ask a question with only one answer - fix assertion failure in svn move - working copy performance improvements - handle existing working copies which become externals - fix recording of WC meta-data for foreign repos copies - fix calculating repository path of replaced directories - fix calculating repository path after commit of switched nodes - svnrdump: don't provide HEAD+1 as base revision for deletes - don't leave conflict markers on files that are moved - avoid unnecessary subtree mergeinfo recording - fix diff of a locally copied directory with props **Server-side bugfixes:** - fsfs: fix a problem verifying pre-1.4 repos used with 1.8 - svnadmin freeze: fix memory allocation error - svnadmin load: tolerate invalid mergeinfo at r0 - svnadmin load: strip references to r1 from mergeinfo http://subversion.tigris.org/issues/show_bug.cgi?id=45 38 - svnsync: strip any r0 references from mergeinfo http://subversion.tigris.org/issues/show_bug.cgi?id=44 76 - fsfs: reduce memory consumption when operating on dag nodes - reject invalid get-location-segments requests in mod_dav_svn and svnserve - mod_dav_svn: reject invalid txnprop change requests **Client-side and server-side bugfixes:** - fix undefined behaviour in string buffer routines - fix consistency issues with APR r/w locks on Windows - fix occasional SEGV if threads load DSOs in parallel - properly duplicate svn error objects - fix use-after-free in config parser Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4411" ); script_set_attribute( attribute:"see_also", value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4476" ); script_set_attribute( attribute:"see_also", value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4533" ); script_set_attribute( attribute:"see_also", value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4538" ); script_set_attribute( attribute:"see_also", value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4551" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205134" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205138" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205140" ); # https://lists.fedoraproject.org/pipermail/package-announce/2015-July/162535.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?1c4153a0" ); script_set_attribute( attribute:"see_also", value:"https://subversion.apache.org/security/CVE-2015-0202-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"https://subversion.apache.org/security/CVE-2015-0248-advisory.txt" ); script_set_attribute( attribute:"see_also", value:"https://subversion.apache.org/security/CVE-2015-0251-advisory.txt" ); script_set_attribute( attribute:"solution", value:"Update the affected subversion package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:subversion"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:21"); script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08"); script_set_attribute(attribute:"patch_publication_date", value:"2015/07/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/29"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^21([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 21.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC21", reference:"subversion-1.8.13-7.fc21")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "subversion"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2015-289.NASL description Apache Subversion was updated to 1.8.13 to fix three vulnerabilities and a number of non-security bugs. This release fixes three vulnerabilities : - Subversion HTTP servers with FSFS repositories were vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. (bsc#923793 CVE-2015-0202) - Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. (bsc#923794 CVE-2015-0248) - Subversion HTTP servers allow spoofing svn:author property values for new revisions (bsc#923795 CVE-2015-0251) Non-security fixes : - fixes number of client and server side non-security bugs - improved working copy performance - reduction of resource use - stability improvements - usability improvements - fix sample configuration comments in subversion.conf [boo#916286] - fix bashisms in mailer-init.sh script last seen 2020-06-05 modified 2015-04-08 plugin id 82635 published 2015-04-08 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/82635 title openSUSE Security Update : subversion (openSUSE-2015-289) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2015-289. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(82635); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251"); script_name(english:"openSUSE Security Update : subversion (openSUSE-2015-289)"); script_summary(english:"Check for the openSUSE-2015-289 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Apache Subversion was updated to 1.8.13 to fix three vulnerabilities and a number of non-security bugs. This release fixes three vulnerabilities : - Subversion HTTP servers with FSFS repositories were vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. (bsc#923793 CVE-2015-0202) - Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. (bsc#923794 CVE-2015-0248) - Subversion HTTP servers allow spoofing svn:author property values for new revisions (bsc#923795 CVE-2015-0251) Non-security fixes : - fixes number of client and server side non-security bugs - improved working copy performance - reduction of resource use - stability improvements - usability improvements - fix sample configuration comments in subversion.conf [boo#916286] - fix bashisms in mailer-init.sh script" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=916286" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923793" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923794" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923795" ); script_set_attribute( attribute:"solution", value:"Update the affected subversion packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-bash-completion"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python-ctypes"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-ruby"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-ruby-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2"); script_set_attribute(attribute:"patch_publication_date", value:"2015/03/31"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1 / 13.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_gnome_keyring-1-0-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_kwallet-1-0-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-bash-completion-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-debugsource-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-devel-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-perl-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-perl-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-python-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-python-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-ruby-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-ruby-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-server-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-server-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-tools-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"subversion-tools-debuginfo-1.8.13-2.36.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_gnome_keyring-1-0-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_kwallet-1-0-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-bash-completion-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-debugsource-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-devel-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-perl-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-perl-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-ctypes-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-ruby-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-ruby-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-server-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-server-debuginfo-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-tools-1.8.13-2.14.1") ) flag++; if ( rpm_check(release:"SUSE13.2", reference:"subversion-tools-debuginfo-1.8.13-2.14.1") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsvn_auth_gnome_keyring-1-0 / etc"); }
References
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html
- http://subversion.apache.org/security/CVE-2015-0202-advisory.txt
- http://subversion.apache.org/security/CVE-2015-0202-advisory.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:192
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:192
- http://www.securityfocus.com/bid/76446
- http://www.securityfocus.com/bid/76446
- http://www.securitytracker.com/id/1032100
- http://www.securitytracker.com/id/1032100
- http://www.ubuntu.com/usn/USN-2721-1
- http://www.ubuntu.com/usn/USN-2721-1
- https://security.gentoo.org/glsa/201610-05
- https://security.gentoo.org/glsa/201610-05