Vulnerabilities > CVE-2015-0251 - Insufficient Verification of Data Authenticity vulnerability in multiple products

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
apache
opensuse
redhat
oracle
apple
CWE-345
nessus

Summary

The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.

Vulnerable Configurations

Part Description Count
Application
Apache
64
Application
Apple
1
OS
Opensuse
2
OS
Redhat
5
OS
Oracle
1

Common Attack Pattern Enumeration and Classification (CAPEC)

  • JSON Hijacking (aka JavaScript Hijacking)
    An attacker targets a system that uses JavaScript Object Notation (JSON) as a transport mechanism between the client and the server (common in Web 2.0 systems using AJAX) to steal possibly confidential information transmitted from the server back to the client inside the JSON object by taking advantage of the loophole in the browser's Same Origin Policy that does not prohibit JavaScript from one website to be included and executed in the context of another website. An attacker gets the victim to visit his or her malicious page that contains a script tag whose source points to the vulnerable system with a URL that requests a response from the server containing a JSON object with possibly confidential information. The malicious page also contains malicious code to capture the JSON object returned by the server before any other processing on it can take place, typically by overriding the JavaScript function used to create new objects. This hook allows the malicious code to get access to the creation of each object and transmit the possibly sensitive contents of the captured JSON object to the attackers' server. There is nothing in the browser's security model to prevent the attackers' malicious JavaScript code (originating from attacker's domain) to set up an environment (as described above) to intercept a JSON object response (coming from the vulnerable target system's domain), read its contents and transmit to the attackers' controlled site. The same origin policy protects the domain object model (DOM), but not the JSON.
  • Cache Poisoning
    An attacker exploits the functionality of cache technologies to cause specific data to be cached that aids the attackers' objectives. This describes any attack whereby an attacker places incorrect or harmful material in cache. The targeted cache can be an application's cache (e.g. a web browser cache) or a public cache (e.g. a DNS or ARP cache). Until the cache is refreshed, most applications or clients will treat the corrupted cache value as valid. This can lead to a wide range of exploits including redirecting web browsers towards sites that install malware and repeatedly incorrect calculations based on the incorrect value.
  • DNS Cache Poisoning
    A domain name server translates a domain name (such as www.example.com) into an IP address that Internet hosts use to contact Internet resources. An attacker modifies a public DNS cache to cause certain names to resolve to incorrect addresses that the attacker specifies. The result is that client applications that rely upon the targeted cache for domain name resolution will be directed not to the actual address of the specified domain name but to some other address. Attackers can use this to herd clients to sites that install malware on the victim's computer or to masquerade as part of a Pharming attack.
  • Cross-Site Scripting Using MIME Type Mismatch
    An attacker creates a file with scripting content but where the specified MIME type of the file is such that scripting is not expected. Some browsers will detect that the specified MIME type of the file does not match the actual type of the content and will automatically switch to using an interpreter for the real content type. If the browser does not invoke script filters before doing this, the attackers' script may run on the target unsanitized. For example, the MIME type text/plain may be used where the actual content is text/javascript or text/html. Since text does not contain scripting instructions, the stated MIME type would indicate that filtering is unnecessary. However, if the target application subsequently determines the file's real type and invokes the appropriate interpreter, scripted content could be invoked. In another example, img tags in HTML content could reference a renderable type file instead of an expected image file. The file extension and MIME type can describe an image file, but the file content can be text/javascript or text/html resulting in script execution. If the browser assumes all references in img tags are images, and therefore do not need to be filtered for scripts, this would bypass content filters. In a cross-site scripting attack, the attacker tricks the victim into accessing a URL that uploads a script file with an incorrectly specified MIME type. If the victim's browser switches to the appropriate interpreter without filtering, the attack will execute as a standard XSS attack, possibly revealing the victim's cookies or executing arbitrary script in their browser.
  • Spoofing of UDDI/ebXML Messages
    An attacker spoofs a UDDI, ebXML, or similar message in order to impersonate a service provider in an e-business transaction. UDDI, ebXML, and similar standards are used to identify businesses in e-business transactions. Among other things, they identify a particular participant, WSDL information for SOAP transactions, and supported communication protocols, including security protocols. By spoofing one of these messages an attacker could impersonate a legitimate business in a transaction or could manipulate the protocols used between a client and business. This could result in disclosure of sensitive information, loss of message integrity, or even financial fraud.

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1633.NASL
    descriptionUpdated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3187. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id85461
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85461
    titleCentOS 6 : subversion (CESA-2015:1633)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:1633 and 
    # CentOS Errata and Security Advisory 2015:1633 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85461);
      script_version("2.5");
      script_cvs_date("Date: 2020/01/02");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1633");
    
      script_name(english:"CentOS 6 : subversion (CESA-2015:1633)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 6.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3187.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      # https://lists.centos.org/pipermail/centos-announce/2015-August/021333.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?5525ea89"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-0248");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 6.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-6", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-devel-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-gnome-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-javahl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-kde-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-perl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-ruby-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"CentOS-6", reference:"subversion-svn2cl-1.6.11-15.el6_7")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1742.NASL
    descriptionUpdated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3184 and CVE-2015-3187 flaws. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id86510
    published2015-10-22
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86510
    titleCentOS 7 : subversion (CESA-2015:1742)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:1742 and 
    # CentOS Errata and Security Advisory 2015:1742 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(86510);
      script_version("2.5");
      script_cvs_date("Date: 2020/01/02");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1742");
    
      script_name(english:"CentOS 7 : subversion (CESA-2015:1742)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote CentOS host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_authz_svn module did not properly restrict
    anonymous access to Subversion repositories under certain
    configurations when used with Apache httpd 2.4.x. This could allow a
    user to anonymously access files in a Subversion repository, which
    should only be accessible to authenticated users. (CVE-2015-3184)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3184 and CVE-2015-3187 flaws.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      # https://lists.centos.org/pipermail/centos-announce/2015-September/021377.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?af0d0b99"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-0248");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/22");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"CentOS Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/CentOS/release");
    if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
    os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 7.x", "CentOS " + os_ver);
    
    if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"mod_dav_svn-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-devel-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-gnome-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-javahl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-kde-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-libs-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-perl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-python-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-ruby-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"CentOS-7", cpu:"x86_64", reference:"subversion-tools-1.7.14-7.el7_1.1")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2721-1.NASL
    descriptionIt was discovered that the Subversion mod_dav_svn module incorrectly handled REPORT requests for a resource that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-3580) It was discovered that the Subversion mod_dav_svn module incorrectly handled requests requiring a lookup for a virtual transaction name that does not exist. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-8108) Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly handled large numbers of REPORT requests. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202) Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve modules incorrectly certain crafted parameter combinations. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2015-0248) Ivan Zhakov discovered that the Subversion mod_dav_svn module incorrectly handled crafted v1 HTTP protocol request sequences. A remote attacker could use this issue to spoof the svn:author property. (CVE-2015-0251) C. Michael Pilato discovered that the Subversion mod_dav_svn module incorrectly restricted anonymous access. A remote attacker could use this issue to read hidden files via the path name. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184) C. Michael Pilato discovered that Subversion incorrectly handled path-based authorization. A remote attacker could use this issue to obtain sensitive path information. (CVE-2015-3187). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id85579
    published2015-08-21
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85579
    titleUbuntu 12.04 LTS / 14.04 LTS / 15.04 : subversion vulnerabilities (USN-2721-1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Ubuntu Security Notice USN-2721-1. The text 
    # itself is copyright (C) Canonical, Inc. See 
    # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered 
    # trademark of Canonical, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85579);
      script_version("2.6");
      script_cvs_date("Date: 2019/09/18 12:31:44");
    
      script_cve_id("CVE-2014-3580", "CVE-2014-8108", "CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187");
      script_xref(name:"USN", value:"2721-1");
    
      script_name(english:"Ubuntu 12.04 LTS / 14.04 LTS / 15.04 : subversion vulnerabilities (USN-2721-1)");
      script_summary(english:"Checks dpkg output for updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Ubuntu host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "It was discovered that the Subversion mod_dav_svn module incorrectly
    handled REPORT requests for a resource that does not exist. A remote
    attacker could use this issue to cause the server to crash, resulting
    in a denial of service. This issue only affected Ubuntu 12.04 LTS and
    Ubuntu 14.04 LTS. (CVE-2014-3580)
    
    It was discovered that the Subversion mod_dav_svn module incorrectly
    handled requests requiring a lookup for a virtual transaction name
    that does not exist. A remote attacker could use this issue to cause
    the server to crash, resulting in a denial of service. This issue only
    affected Ubuntu 14.04 LTS. (CVE-2014-8108)
    
    Evgeny Kotkov discovered that the Subversion mod_dav_svn module
    incorrectly handled large numbers of REPORT requests. A remote
    attacker could use this issue to cause the server to crash, resulting
    in a denial of service. This issue only affected Ubuntu 14.04 LTS and
    Ubuntu 15.04. (CVE-2015-0202)
    
    Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve
    modules incorrectly certain crafted parameter combinations. A remote
    attacker could use this issue to cause the server to crash, resulting
    in a denial of service. (CVE-2015-0248)
    
    Ivan Zhakov discovered that the Subversion mod_dav_svn module
    incorrectly handled crafted v1 HTTP protocol request sequences. A
    remote attacker could use this issue to spoof the svn:author property.
    (CVE-2015-0251)
    
    C. Michael Pilato discovered that the Subversion mod_dav_svn module
    incorrectly restricted anonymous access. A remote attacker could use
    this issue to read hidden files via the path name. This issue only
    affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184)
    
    C. Michael Pilato discovered that Subversion incorrectly handled
    path-based authorization. A remote attacker could use this issue to
    obtain sensitive path information. (CVE-2015-3187).
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Ubuntu security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://usn.ubuntu.com/2721-1/"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Update the affected libapache2-svn, libsvn1 and / or subversion
    packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libapache2-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libsvn1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:12.04:-:lts");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:14.04");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:15.04");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2014/12/18");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/21");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"Ubuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Ubuntu Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("ubuntu.inc");
    include("misc_func.inc");
    
    if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/Ubuntu/release");
    if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
    release = chomp(release);
    if (! preg(pattern:"^(12\.04|14\.04|15\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 12.04 / 14.04 / 15.04", "Ubuntu " + release);
    if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
    
    flag = 0;
    
    if (ubuntu_check(osver:"12.04", pkgname:"libapache2-svn", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"12.04", pkgname:"libsvn1", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"12.04", pkgname:"subversion", pkgver:"1.6.17dfsg-3ubuntu3.5")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"libapache2-svn", pkgver:"1.8.8-1ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"libsvn1", pkgver:"1.8.8-1ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"14.04", pkgname:"subversion", pkgver:"1.8.8-1ubuntu3.2")) flag++;
    if (ubuntu_check(osver:"15.04", pkgname:"libapache2-svn", pkgver:"1.8.10-5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"15.04", pkgname:"libsvn1", pkgver:"1.8.10-5ubuntu1.1")) flag++;
    if (ubuntu_check(osver:"15.04", pkgname:"subversion", pkgver:"1.8.10-5ubuntu1.1")) flag++;
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_HOLE,
        extra      : ubuntu_report_get()
      );
      exit(0);
    }
    else
    {
      tested = ubuntu_pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libapache2-svn / libsvn1 / subversion");
    }
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150908_SUBVERSION_ON_SL7_X.NASL
    descriptionAn assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-03-18
    modified2015-09-09
    plugin id85867
    published2015-09-09
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85867
    titleScientific Linux Security Update : subversion on SL7.x x86_64 (20150908)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85867);
      script_version("2.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187");
    
      script_name(english:"Scientific Linux Security Update : subversion on SL7.x x86_64 (20150908)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_authz_svn module did not properly restrict
    anonymous access to Subversion repositories under certain
    configurations when used with Apache httpd 2.4.x. This could allow a
    user to anonymously access files in a Subversion repository, which
    should only be accessible to authenticated users. (CVE-2015-3184)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    After installing the updated packages, for the update to take effect,
    you must restart the httpd daemon, if you are using mod_dav_svn, and
    the svnserve daemon, if you are serving Subversion repositories via
    the svn:// protocol."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1509&L=scientific-linux-errata&F=&S=&P=10618
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?fa5f787d"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/09");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"mod_dav_svn-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-debuginfo-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-devel-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-gnome-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-javahl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-kde-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-libs-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-perl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-python-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-ruby-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"SL7", cpu:"x86_64", reference:"subversion-tools-1.7.14-7.el7_1.1")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1633.NASL
    descriptionUpdated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3187. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id85494
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85494
    titleRHEL 6 : subversion (RHSA-2015:1633)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:1633. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85494);
      script_version("2.9");
      script_cvs_date("Date: 2019/10/24 15:35:40");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1633");
    
      script_name(english:"RHEL 6 : subversion (RHSA-2015:1633)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 6.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3187.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0251-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-3187-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2015:1633"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-3187"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0248"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0251"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2015:1633";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL6", cpu:"i686", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"s390x", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-debuginfo-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-devel-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-gnome-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-javahl-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-kde-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-perl-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-ruby-1.6.11-15.el6_7")) flag++;
    
      if (rpm_check(release:"RHEL6", reference:"subversion-svn2cl-1.6.11-15.el6_7")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
      }
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-192.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in subversion : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests (CVE-2015-0202). Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers (CVE-2015-0248). Subversion HTTP servers allow spoofing svn:author property values for new revisions (CVE-2015-0251). The updated packages have been upgraded to the 1.7.20 and 1.8.13 versions where these security flaws has been fixed.
    last seen2020-06-01
    modified2020-06-02
    plugin id82563
    published2015-04-03
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82563
    titleMandriva Linux Security Advisory : subversion (MDVSA-2015:192)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2015:192. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82563);
      script_version("1.4");
      script_cvs_date("Date: 2019/08/02 13:32:57");
    
      script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251");
      script_xref(name:"MDVSA", value:"2015:192");
    
      script_name(english:"Mandriva Linux Security Advisory : subversion (MDVSA-2015:192)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple vulnerabilities has been discovered and corrected in
    subversion :
    
    Subversion HTTP servers with FSFS repositories are vulnerable to a
    remotely triggerable excessive memory use with certain REPORT requests
    (CVE-2015-0202).
    
    Subversion mod_dav_svn and svnserve are vulnerable to a remotely
    triggerable assertion DoS vulnerability for certain requests with
    dynamically evaluated revision numbers (CVE-2015-0248).
    
    Subversion HTTP servers allow spoofing svn:author property values for
    new revisions (CVE-2015-0251).
    
    The updated packages have been upgraded to the 1.7.20 and 1.8.13
    versions where these security flaws has been fixed."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0202-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0251-advisory.txt"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:apache-mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn-gnome-keyring0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svn0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64svnjavahl1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-SVN");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:perl-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:python-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:ruby-svn-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-gnome-keyring-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:svn-javahl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/04/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"apache-mod_dav_svn-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn-gnome-keyring0-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svn0-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"lib64svnjavahl1-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-SVN-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"perl-svn-devel-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"python-svn-devel-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"ruby-svn-devel-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-devel-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-doc-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-gnome-keyring-devel-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-server-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"subversion-tools-1.7.20-1.mbs1")) flag++;
    if (rpm_check(release:"MDK-MBS1", cpu:"x86_64", reference:"svn-javahl-1.7.20-1.mbs1")) flag++;
    
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"apache-mod_dav_svn-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64svn0-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64svnjavahl1-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"perl-SVN-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"perl-svn-devel-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"python-svn-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"python-svn-devel-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"ruby-svn-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"ruby-svn-devel-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-devel-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-doc-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-server-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"subversion-tools-1.8.13-1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"svn-javahl-1.8.13-1.mbs2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3231.NASL
    descriptionSeveral vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2015-0248 Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. - CVE-2015-0251 Subversion HTTP servers allow spoofing svn:author property values for new revisions via specially crafted v1 HTTP protocol request sequences.
    last seen2020-06-01
    modified2020-06-02
    plugin id82930
    published2015-04-22
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/82930
    titleDebian DSA-3231-1 : subversion - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3231. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82930);
      script_version("1.4");
      script_cvs_date("Date: 2018/11/10 11:49:37");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251");
      script_xref(name:"DSA", value:"3231");
    
      script_name(english:"Debian DSA-3231-1 : subversion - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities were discovered in Subversion, a version
    control system. The Common Vulnerabilities and Exposures project
    identifies the following problems :
    
      - CVE-2015-0248
        Subversion mod_dav_svn and svnserve were vulnerable to a
        remotely triggerable assertion DoS vulnerability for
        certain requests with dynamically evaluated revision
        numbers.
    
      - CVE-2015-0251
        Subversion HTTP servers allow spoofing svn:author
        property values for new revisions via specially crafted
        v1 HTTP protocol request sequences."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-0248"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-0251"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/subversion"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2015/dsa-3231"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the subversion packages.
    
    For the stable distribution (wheezy), these problems have been fixed
    in version 1.6.17dfsg-4+deb7u9.
    
    For the upcoming stable distribution (jessie), these problems have
    been fixed in version 1.8.10-6."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/04/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/22");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"libapache2-svn", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-dev", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-doc", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-java", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-perl", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-ruby", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn-ruby1.8", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"libsvn1", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"python-subversion", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"subversion", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    if (deb_check(release:"7.0", prefix:"subversion-tools", reference:"1.6.17dfsg-4+deb7u9")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201610-05.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201610-05 (Subversion, Serf: Multiple Vulnerabilities) Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id93992
    published2016-10-12
    reporterThis script is Copyright (C) 2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/93992
    titleGLSA-201610-05 : Subversion, Serf: Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Gentoo Linux Security Advisory GLSA 201610-05.
    #
    # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.
    # and licensed under the Creative Commons - Attribution / Share Alike 
    # license. See http://creativecommons.org/licenses/by-sa/3.0/
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(93992);
      script_version("$Revision: 2.1 $");
      script_cvs_date("$Date: 2016/10/12 13:47:11 $");
    
      script_cve_id("CVE-2014-0032", "CVE-2014-3504", "CVE-2014-3522", "CVE-2014-3528", "CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187", "CVE-2015-5259", "CVE-2016-2167", "CVE-2016-2168");
      script_xref(name:"GLSA", value:"201610-05");
    
      script_name(english:"GLSA-201610-05 : Subversion, Serf: Multiple Vulnerabilities");
      script_summary(english:"Checks for updated package(s) in /var/db/pkg");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Gentoo host is missing one or more security-related
    patches."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is affected by the vulnerability described in GLSA-201610-05
    (Subversion, Serf: Multiple Vulnerabilities)
    
        Multiple vulnerabilities have been discovered in Subversion and Serf.
          Please review the CVE identifiers referenced below for details
      
    Impact :
    
        A remote attacker could possibly execute arbitrary code with the
          privileges of the process, conduct a man-in-the-middle attack, obtain
          sensitive information, or cause a Denial of Service Condition.
      
    Workaround :
    
        There is no known workaround at this time."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security.gentoo.org/glsa/201610-05"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "All Subversion users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=dev-vcs/subversion-1.9.4'
        All Serf users should upgrade to the latest version:
          # emerge --sync
          # emerge --ask --oneshot --verbose '>=net-libs/serf-1.3.7'"
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:serf");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2016/10/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2016/10/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2016 Tenable Network Security, Inc.");
      script_family(english:"Gentoo Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("qpkg.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo");
    if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (qpkg_check(package:"dev-vcs/subversion", unaffected:make_list("ge 1.9.4", "rgt 1.8.16"), vulnerable:make_list("lt 1.9.4"))) flag++;
    if (qpkg_check(package:"net-libs/serf", unaffected:make_list("ge 1.3.7"), vulnerable:make_list("lt 1.3.7"))) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = qpkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Subversion / Serf");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1742.NASL
    descriptionFrom Red Hat Security Advisory 2015:1742 : Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3184 and CVE-2015-3187 flaws. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id85865
    published2015-09-09
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85865
    titleOracle Linux 7 : subversion (ELSA-2015-1742)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2015:1742 and 
    # Oracle Linux Security Advisory ELSA-2015-1742 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85865);
      script_version("2.6");
      script_cvs_date("Date: 2019/09/27 13:00:36");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1742");
    
      script_name(english:"Oracle Linux 7 : subversion (ELSA-2015-1742)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2015:1742 :
    
    Updated subversion packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_authz_svn module did not properly restrict
    anonymous access to Subversion repositories under certain
    configurations when used with Apache httpd 2.4.x. This could allow a
    user to anonymously access files in a Subversion repository, which
    should only be accessible to authenticated users. (CVE-2015-3184)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3184 and CVE-2015-3187 flaws.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2015-September/005391.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/09");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 7", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    if ("x86_64" >!< cpu) audit(AUDIT_ARCH_NOT, "x86_64", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"mod_dav_svn-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-devel-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-gnome-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-javahl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-kde-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-libs-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-perl-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-python-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-ruby-1.7.14-7.el7_1.1")) flag++;
    if (rpm_check(release:"EL7", cpu:"x86_64", reference:"subversion-tools-1.7.14-7.el7_1.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2015-587.NASL
    descriptionThe mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes. (CVE-2015-0202) An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251)
    last seen2020-06-01
    modified2020-06-02
    plugin id85632
    published2015-08-26
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85632
    titleAmazon Linux AMI : subversion / mod_dav_svn (ALAS-2015-587)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Amazon Linux AMI Security Advisory ALAS-2015-587.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85632);
      script_version("2.2");
      script_cvs_date("Date: 2018/04/18 15:09:35");
    
      script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251");
      script_xref(name:"ALAS", value:"2015-587");
    
      script_name(english:"Amazon Linux AMI : subversion / mod_dav_svn (ALAS-2015-587)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Amazon Linux AMI host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows
    remote attackers to cause a denial of service (memory consumption) via
    a large number of REPORT requests, which trigger the traversal of FSFS
    repository nodes. (CVE-2015-0202)
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://alas.aws.amazon.com/ALAS-2015-587.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Run 'yum update subversion mod_dav_svn' to update your system."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod24_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:mod_dav_svn-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-python26");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-python27");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:amazon:linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:amazon:linux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/26");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
      script_family(english:"Amazon Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/AmazonLinux/release", "Host/AmazonLinux/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    release = get_kb_item("Host/AmazonLinux/release");
    if (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, "Amazon Linux");
    os_ver = pregmatch(pattern: "^AL(A|\d)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Amazon Linux");
    os_ver = os_ver[1];
    if (os_ver != "A")
    {
      if (os_ver == 'A') os_ver = 'AMI';
      audit(AUDIT_OS_NOT, "Amazon Linux AMI", "Amazon Linux " + os_ver);
    }
    
    if (!get_kb_item("Host/AmazonLinux/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (rpm_check(release:"ALA", reference:"mod24_dav_svn-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"mod_dav_svn-1.8.13-7.50.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"mod_dav_svn-debuginfo-1.8.13-7.50.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-debuginfo-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-devel-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-javahl-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-libs-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-perl-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-python26-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-python27-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-ruby-1.8.13-7.52.amzn1")) flag++;
    if (rpm_check(release:"ALA", reference:"subversion-tools-1.8.13-7.52.amzn1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod24_dav_svn / mod_dav_svn / mod_dav_svn-debuginfo / subversion / etc");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_8E887B71D76911E4B1C220CF30E32F6D.NASL
    descriptionSubversion Project reports : Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. Subversion HTTP servers allow spoofing svn:author property values for new revisions.
    last seen2020-06-01
    modified2020-06-02
    plugin id82481
    published2015-04-01
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/82481
    titleFreeBSD : subversion -- DoS vulnerabilities (8e887b71-d769-11e4-b1c2-20cf30e32f6d)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82481);
      script_version("1.3");
      script_cvs_date("Date: 2018/11/10 11:49:44");
    
      script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251");
    
      script_name(english:"FreeBSD : subversion -- DoS vulnerabilities (8e887b71-d769-11e4-b1c2-20cf30e32f6d)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Subversion Project reports :
    
    Subversion HTTP servers with FSFS repositories are vulnerable to a
    remotely triggerable excessive memory use with certain REPORT
    requests.
    
    Subversion mod_dav_svn and svnserve are vulnerable to a remotely
    triggerable assertion DoS vulnerability for certain requests with
    dynamically evaluated revision numbers.
    
    Subversion HTTP servers allow spoofing svn:author property values for
    new revisions."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0202-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.apache.org/security/CVE-2015-0251-advisory.txt"
      );
      # https://vuxml.freebsd.org/freebsd/8e887b71-d769-11e4-b1c2-20cf30e32f6d.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?9b6dfab2"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion16");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:subversion17");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/03/31");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/01");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"mod_dav_svn>=1.5.0<1.7.20")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mod_dav_svn>=1.8.0<1.8.13")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"subversion16>=1.0.0<1.7.20")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"subversion17>=1.0.0<1.7.20")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"subversion>=1.0.0<1.7.20")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"subversion>=1.8.0<1.8.13")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150817_SUBVERSION_ON_SL6_X.NASL
    descriptionAn assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-03-18
    modified2015-08-18
    plugin id85503
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85503
    titleScientific Linux Security Update : subversion on SL6.x i386/x86_64 (20150817)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text is (C) Scientific Linux.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85503);
      script_version("2.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3187");
    
      script_name(english:"Scientific Linux Security Update : subversion on SL6.x i386/x86_64 (20150817)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Scientific Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    After installing the updated packages, for the update to take effect,
    you must restart the httpd daemon, if you are using mod_dav_svn, and
    the svnserve daemon, if you are serving Subversion repositories via
    the svn:// protocol."
      );
      # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1508&L=scientific-linux-errata&F=&S=&P=15573
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7e12bdf7"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Scientific Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
    os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 6.x", "Scientific Linux " + os_ver);
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SL6", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-debuginfo-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-devel-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-gnome-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-javahl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-kde-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-perl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-ruby-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"SL6", reference:"subversion-svn2cl-1.6.11-15.el6_7")) flag++;
    
    
    if (flag)
    {
      security_report_v4(
        port       : 0,
        severity   : SECURITY_WARNING,
        extra      : rpm_report_get()
      );
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1742.NASL
    descriptionUpdated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3184 and CVE-2015-3187 flaws. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id85978
    published2015-09-17
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85978
    titleRHEL 7 : subversion (RHSA-2015:1742)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2015:1742. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85978);
      script_version("1.11");
      script_cvs_date("Date: 2019/10/24 15:35:40");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3184", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1742");
    
      script_name(english:"RHEL 7 : subversion (RHSA-2015:1742)");
      script_summary(english:"Checks the rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated subversion packages that fix multiple security issues are now
    available for Red Hat Enterprise Linux 7.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_authz_svn module did not properly restrict
    anonymous access to Subversion repositories under certain
    configurations when used with Apache httpd 2.4.x. This could allow a
    user to anonymously access files in a Subversion repository, which
    should only be accessible to authenticated users. (CVE-2015-3184)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3184 and CVE-2015-3187 flaws.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-3184-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0251-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-3187-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2015:1742"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-3187"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0248"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-0251"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2015-3184"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-libs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.3");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.4");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.6");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7.7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/17");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2015:1742";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"mod_dav_svn-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"mod_dav_svn-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-debuginfo-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-devel-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-gnome-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-javahl-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-kde-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-libs-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-perl-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"subversion-python-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"subversion-python-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", reference:"subversion-ruby-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"s390x", reference:"subversion-tools-1.7.14-7.el7_1.1")) flag++;
    
      if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"subversion-tools-1.7.14-7.el7_1.1")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-debuginfo / subversion-devel / etc");
      }
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-207.NASL
    descriptionSeveral vulnerabilities were discovered in Subversion, a version control system. The Common Vulnerabilities and Exposures project identifies the following problems : CVE-2015-0248 Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. CVE-2015-0251 Subversion HTTP servers allow spoofing svn:author property values for new revisions via specially crafted v1 HTTP protocol request sequences. CVE-2013-1845 Subversion mod_dav_svn was vulnerable to a denial of service attack through a remotely triggered memory exhaustion. CVE-2013-1846 / CVE-2013-1847 / CVE-2013-1849 / CVE-2014-0032 Subversion mod_dav_svn was vulnerable to multiple remotely triggered crashes. This update has been prepared by James McCoy. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-04-27
    plugin id83060
    published2015-04-27
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83060
    titleDebian DLA-207-1 : subversion security update
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Debian Security Advisory DLA-207-1. The text
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83060);
      script_version("2.7");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/12");
    
      script_cve_id("CVE-2013-1845", "CVE-2013-1846", "CVE-2013-1847", "CVE-2013-1849", "CVE-2014-0032", "CVE-2015-0248", "CVE-2015-0251");
      script_bugtraq_id(58323, 58895, 58896, 58897, 65434, 74259, 74260);
    
      script_name(english:"Debian DLA-207-1 : subversion security update");
      script_summary(english:"Checks dpkg output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities were discovered in Subversion, a version
    control system. The Common Vulnerabilities and Exposures project
    identifies the following problems :
    
    CVE-2015-0248
    
    Subversion mod_dav_svn and svnserve were vulnerable to a remotely
    triggerable assertion DoS vulnerability for certain requests with
    dynamically evaluated revision numbers.
    
    CVE-2015-0251
    
    Subversion HTTP servers allow spoofing svn:author property values for
    new revisions via specially crafted v1 HTTP protocol request
    sequences.
    
    CVE-2013-1845
    
    Subversion mod_dav_svn was vulnerable to a denial of service attack
    through a remotely triggered memory exhaustion.
    
    CVE-2013-1846 / CVE-2013-1847 / CVE-2013-1849 / CVE-2014-0032
    
    Subversion mod_dav_svn was vulnerable to multiple remotely triggered
    crashes.
    
    This update has been prepared by James McCoy.
    
    NOTE: Tenable Network Security has extracted the preceding description
    block directly from the DLA security advisory. Tenable has attempted
    to automatically clean and format it as much as possible without
    introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://lists.debian.org/debian-lts-announce/2015/04/msg00021.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/squeeze-lts/subversion"
      );
      script_set_attribute(attribute:"solution", value:"Upgrade the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libapache2-svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-dev");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-java");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn-ruby1.8");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libsvn1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:python-subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/04/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"6.0", prefix:"libapache2-svn", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-dev", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-doc", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-java", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-perl", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-ruby", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn-ruby1.8", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"libsvn1", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"python-subversion", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"subversion", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    if (deb_check(release:"6.0", prefix:"subversion-tools", reference:"1.6.12dfsg-7+deb6u2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-11795.NASL
    descriptionThis update includes the latest stable release of **Apache Subversion**, version **1.8.13**. Three security vulnerabilities are fixed in this update : - CVE-2015-0202: https://subversion.apache.org/security/CVE-2015-0202-adv isory.txt - CVE-2015-0248: https://subversion.apache.org/security/CVE-2015-0248-a dvisory.txt - CVE-2015-0251: https://subversion.apache.org/security/CVE-2015-0251-a dvisory.txt In addition, the following changes are included in the Subversion 1.8.13 update : **Client-side bugfixes:** - ra_serf: prevent abort of commits that have already succeeded - ra_serf: support case-insensitivity in HTTP headers - better error message if an external is shadowed - ra_svn: fix reporting of directory read errors - fix a redirect handling bug in
    last seen2020-06-05
    modified2015-07-29
    plugin id85065
    published2015-07-29
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85065
    titleFedora 21 : subversion-1.8.13-7.fc21 (2015-11795)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2015-11795.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85065);
      script_version("2.4");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251");
      script_xref(name:"FEDORA", value:"2015-11795");
    
      script_name(english:"Fedora 21 : subversion-1.8.13-7.fc21 (2015-11795)");
      script_summary(english:"Checks rpm output for the updated package.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "This update includes the latest stable release of **Apache
    Subversion**, version **1.8.13**.
    
    Three security vulnerabilities are fixed in this update :
    
      - CVE-2015-0202:
        https://subversion.apache.org/security/CVE-2015-0202-adv
        isory.txt
    
        - CVE-2015-0248:
          https://subversion.apache.org/security/CVE-2015-0248-a
          dvisory.txt
    
        - CVE-2015-0251:
          https://subversion.apache.org/security/CVE-2015-0251-a
          dvisory.txt
    
    In addition, the following changes are included in the Subversion
    1.8.13 update :
    
    **Client-side bugfixes:**
    
      - ra_serf: prevent abort of commits that have already
        succeeded
    
        - ra_serf: support case-insensitivity in HTTP headers
    
        - better error message if an external is shadowed
    
        - ra_svn: fix reporting of directory read errors
    
        - fix a redirect handling bug in 'svn log' over HTTP
    
        - properly copy tree conflict information
    
        - fix 'svn patch' output for reordered hunks
          http://subversion.tigris.org/issues/show_bug.cgi?id=45
          33
    
        - svnrdump load: don't load wrong props with no-deltas
          dump
          http://subversion.tigris.org/issues/show_bug.cgi?id=45
          51
    
        - fix working copy corruption with relative file
          external
          http://subversion.tigris.org/issues/show_bug.cgi?id=44
          11
    
        - don't crash if config file is unreadable
    
        - svn resolve: don't ask a question with only one answer
    
        - fix assertion failure in svn move
    
        - working copy performance improvements
    
        - handle existing working copies which become externals
    
        - fix recording of WC meta-data for foreign repos copies
    
        - fix calculating repository path of replaced
          directories
    
        - fix calculating repository path after commit of
          switched nodes
    
        - svnrdump: don't provide HEAD+1 as base revision for
          deletes
    
        - don't leave conflict markers on files that are moved
    
        - avoid unnecessary subtree mergeinfo recording
    
        - fix diff of a locally copied directory with props
    
    **Server-side bugfixes:**
    
      - fsfs: fix a problem verifying pre-1.4 repos used with
        1.8
    
        - svnadmin freeze: fix memory allocation error
    
        - svnadmin load: tolerate invalid mergeinfo at r0
    
        - svnadmin load: strip references to r1 from mergeinfo
          http://subversion.tigris.org/issues/show_bug.cgi?id=45
          38
    
        - svnsync: strip any r0 references from mergeinfo
          http://subversion.tigris.org/issues/show_bug.cgi?id=44
          76
    
        - fsfs: reduce memory consumption when operating on dag
          nodes
    
        - reject invalid get-location-segments requests in
          mod_dav_svn and svnserve
    
        - mod_dav_svn: reject invalid txnprop change requests
    
    **Client-side and server-side bugfixes:**
    
      - fix undefined behaviour in string buffer routines
    
        - fix consistency issues with APR r/w locks on Windows
    
        - fix occasional SEGV if threads load DSOs in parallel
    
        - properly duplicate svn error objects
    
        - fix use-after-free in config parser
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4411"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4476"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4533"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4538"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://subversion.tigris.org/issues/show_bug.cgi?id=4551"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205134"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205138"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=1205140"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2015-July/162535.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?1c4153a0"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0202-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://subversion.apache.org/security/CVE-2015-0251-advisory.txt"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion package."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:subversion");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:21");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/07/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/07/29");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^21([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 21.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC21", reference:"subversion-1.8.13-7.fc21")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "subversion");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1633.NASL
    descriptionFrom Red Hat Security Advisory 2015:1633 : Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. An assertion failure flaw was found in the way the SVN server processed certain requests with dynamically evaluated revision numbers. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3187. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol.
    last seen2020-06-01
    modified2020-06-02
    plugin id85489
    published2015-08-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/85489
    titleOracle Linux 6 : subversion (ELSA-2015-1633)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2015:1633 and 
    # Oracle Linux Security Advisory ELSA-2015-1633 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85489);
      script_version("2.6");
      script_cvs_date("Date: 2019/09/27 13:00:36");
    
      script_cve_id("CVE-2015-0248", "CVE-2015-0251", "CVE-2015-3187");
      script_xref(name:"RHSA", value:"2015:1633");
    
      script_name(english:"Oracle Linux 6 : subversion (ELSA-2015-1633)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2015:1633 :
    
    Updated subversion packages that fix three security issues are now
    available for Red Hat Enterprise Linux 6.
    
    Red Hat Product Security has rated this update as having Moderate
    security impact. Common Vulnerability Scoring System (CVSS) base
    scores, which give detailed severity ratings, are available for each
    vulnerability from the CVE links in the References section.
    
    Subversion (SVN) is a concurrent version control system which enables
    one or more users to collaborate in developing and maintaining a
    hierarchy of files and directories while keeping a history of all
    changes. The mod_dav_svn module is used with the Apache HTTP Server to
    allow access to Subversion repositories via HTTP.
    
    An assertion failure flaw was found in the way the SVN server
    processed certain requests with dynamically evaluated revision
    numbers. A remote attacker could use this flaw to cause the SVN server
    (both svnserve and httpd with the mod_dav_svn module) to crash.
    (CVE-2015-0248)
    
    It was found that the mod_dav_svn module did not properly validate the
    svn:author property of certain requests. An attacker able to create
    new revisions could use this flaw to spoof the svn:author property.
    (CVE-2015-0251)
    
    It was found that when an SVN server (both svnserve and httpd with the
    mod_dav_svn module) searched the history of a file or a directory, it
    would disclose its location in the repository if that file or
    directory was not readable (for example, if it had been moved).
    (CVE-2015-3187)
    
    Red Hat would like to thank the Apache Software Foundation for
    reporting these issues. Upstream acknowledges Evgeny Kotkov of
    VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251,
    and C. Michael Pilato of CollabNet as the original reporter of
    CVE-2015-3187.
    
    All subversion users should upgrade to these updated packages, which
    contain backported patches to correct these issues. After installing
    the updated packages, for the update to take effect, you must restart
    the httpd daemon, if you are using mod_dav_svn, and the svnserve
    daemon, if you are serving Subversion repositories via the svn://
    protocol."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2015-August/005345.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:mod_dav_svn");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-gnome");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-javahl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-kde");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:subversion-svn2cl");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/04/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/08/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/18");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 6", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL6", reference:"mod_dav_svn-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-devel-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-gnome-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-javahl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-kde-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-perl-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-ruby-1.6.11-15.el6_7")) flag++;
    if (rpm_check(release:"EL6", reference:"subversion-svn2cl-1.6.11-15.el6_7")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "mod_dav_svn / subversion / subversion-devel / subversion-gnome / etc");
    }
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_XCODE_7_0.NASL
    descriptionThe version of Apple Xcode installed on the remote Mac OS X host is prior to 7.0. It is, therefore, affected by the multiple vulnerabilities : - A memory leak issue exists in file d1_srtp.c related to the DTLS SRTP extension handling and specially crafted handshake messages. An attacker can exploit this to cause denial of service condition. (CVE-2014-3513) - A man-in-the-middle (MitM) information disclosure vulnerability, known as POODLE, exists due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566) - A memory leak issue exists in file t1_lib.c related to session ticket handling. An attacker can exploit this to cause denial of service condition. (CVE-2014-3567) - An error exists related to the build configuration process and the
    last seen2020-05-06
    modified2015-10-02
    plugin id86245
    published2015-10-02
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/86245
    titleApple Xcode < 7.0 (Mac OS X) (POODLE)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(86245);
      script_version("1.10");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/05");
    
      script_cve_id(
        "CVE-2014-3513",
        "CVE-2014-3566",
        "CVE-2014-3567",
        "CVE-2014-3568",
        "CVE-2014-6394",
        "CVE-2015-0248",
        "CVE-2015-0251",
        "CVE-2015-3185",
        "CVE-2015-5909",
        "CVE-2015-5910"
      );
      script_bugtraq_id(
        70100,
        70574,
        70584,
        70585,
        70586,
        74259,
        74260,
        75965
      );
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2015-09-16-2");
      script_xref(name:"CERT", value:"577193");
    
      script_name(english:"Apple Xcode < 7.0 (Mac OS X) (POODLE)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host has an application installed that is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Apple Xcode installed on the remote Mac OS X host is
    prior to 7.0. It is, therefore, affected by the multiple
    vulnerabilities :
    
      - A memory leak issue exists in file d1_srtp.c related to
        the DTLS SRTP extension handling and specially crafted
        handshake messages. An attacker can exploit this to 
        cause denial of service condition. (CVE-2014-3513)
    
      - A man-in-the-middle (MitM) information disclosure
        vulnerability, known as POODLE, exists due to the way
        SSL 3.0 handles padding bytes when decrypting messages
        encrypted using block ciphers in cipher block chaining
        (CBC) mode. A MitM attacker can decrypt a selected byte
        of a cipher text in as few as 256 tries if they are able
        to force a victim application to repeatedly send the
        same data over newly created SSL 3.0 connections.
        (CVE-2014-3566)
    
      - A memory leak issue exists in file t1_lib.c related to
        session ticket handling. An attacker can exploit this to 
        cause denial of service condition. (CVE-2014-3567)
    
      - An error exists related to the build configuration
        process and the 'no-ssl3' build option that allows
        servers and clients to process insecure SSL 3.0
        handshake messages. (CVE-2014-3568)
    
      - A directory traversal vulnerability exists in send.js
        due to improper sanitization of user-supplied input.
        A remote, unauthenticated attacker can exploit this, via
        a specially crafted request, to access arbitrary files
        outside of the restricted path. (CVE-2014-6394)
    
      - A denial of service vulnerability exists in the
        mod_dav_svn and svnserve servers of Apache Subversion. A
        remote, unauthenticated attacker can exploit this, via a
        crafted combination of parameters, to cause the current
        process to abort through a failed assertion.
        (CVE-2015-0248)
    
      - A flaw exists in the mod_dav_svn server of Apache
        Subversion. A remote, authenticated attacker can exploit
        this, via a crafted HTTP request sequence, to spoof an
        'svn:author' property value. (CVE-2015-0251)
    
      - A flaw exists in the Apache HTTP Server due to the
        ap_some_auth_required() function in file request.c not
        properly handling Require directive associations. A
        remote, unauthenticated attacker can exploit this to
        bypass access restrictions, by leveraging a module that
        relies on the 2.2 API behavior. (CVE-2015-3185)
    
      - A flaw exists in the IDE Xcode server due to improper
        restriction of access to the repository email lists. A
        remote, unauthenticated attacker can exploit this to
        access sensitive build information, by leveraging
        incorrect notification delivery. (CVE-2015-5909)
    
      - A flaw exists in the IDE Xcode server due to the
        transmission of server information in cleartext. A
        remote, man-in-the-middle attacker can exploit this to
        access sensitive information. (CVE-2015-5910)");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-ca/HT205217");
      # http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9042c568");
      script_set_attribute(attribute:"see_also", value:"https://www.imperialviolet.org/2014/10/14/poodle.html");
      script_set_attribute(attribute:"see_also", value:"https://www.openssl.org/~bodo/ssl-poodle.pdf");
      script_set_attribute(attribute:"see_also", value:"https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple Xcode version 7.0, which is available for OS X version 10.10.4 (Yosemite) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-6394");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date",value:"2014/10/14");
      script_set_attribute(attribute:"patch_publication_date",value:"2015/09/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/02");
    
      script_set_attribute(attribute:"plugin_type",value:"local");
      script_set_attribute(attribute:"cpe",value:"cpe:/a:apple:xcode");
      script_set_attribute(attribute:"in_the_news", value:"true");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_xcode_installed.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "installed_sw/Apple Xcode");
    
      exit(0);
    }
    
    include('vcf.inc');
    
    get_kb_item_or_exit('Host/local_checks_enabled');
    
    os = get_kb_item('Host/MacOSX/Version');
    if (empty_or_null(os))
      audit(AUDIT_OS_NOT, 'macOS or Mac OS X');
    
    app_info = vcf::get_app_info(app:'Apple Xcode');
    
    constraints = [
      { 'fixed_version' : '7.0' }
    ];
    
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-289.NASL
    descriptionApache Subversion was updated to 1.8.13 to fix three vulnerabilities and a number of non-security bugs. This release fixes three vulnerabilities : - Subversion HTTP servers with FSFS repositories were vulnerable to a remotely triggerable excessive memory use with certain REPORT requests. (bsc#923793 CVE-2015-0202) - Subversion mod_dav_svn and svnserve were vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers. (bsc#923794 CVE-2015-0248) - Subversion HTTP servers allow spoofing svn:author property values for new revisions (bsc#923795 CVE-2015-0251) Non-security fixes : - fixes number of client and server side non-security bugs - improved working copy performance - reduction of resource use - stability improvements - usability improvements - fix sample configuration comments in subversion.conf [boo#916286] - fix bashisms in mailer-init.sh script
    last seen2020-06-05
    modified2015-04-08
    plugin id82635
    published2015-04-08
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/82635
    titleopenSUSE Security Update : subversion (openSUSE-2015-289)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-289.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(82635);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2015-0202", "CVE-2015-0248", "CVE-2015-0251");
    
      script_name(english:"openSUSE Security Update : subversion (openSUSE-2015-289)");
      script_summary(english:"Check for the openSUSE-2015-289 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Apache Subversion was updated to 1.8.13 to fix three vulnerabilities
    and a number of non-security bugs.
    
    This release fixes three vulnerabilities :
    
      - Subversion HTTP servers with FSFS repositories were
        vulnerable to a remotely triggerable excessive memory
        use with certain REPORT requests. (bsc#923793
        CVE-2015-0202) 
    
      - Subversion mod_dav_svn and svnserve were vulnerable to a
        remotely triggerable assertion DoS vulnerability for
        certain requests with dynamically evaluated revision
        numbers. (bsc#923794 CVE-2015-0248)
    
      - Subversion HTTP servers allow spoofing svn:author
        property values for new revisions (bsc#923795
        CVE-2015-0251)
    
    Non-security fixes :
    
      - fixes number of client and server side non-security bugs
    
      - improved working copy performance
    
      - reduction of resource use
    
      - stability improvements
    
      - usability improvements
    
      - fix sample configuration comments in subversion.conf
        [boo#916286]
    
      - fix bashisms in mailer-init.sh script"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=916286"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923793"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923794"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=923795"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected subversion packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_gnome_keyring-1-0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsvn_auth_kwallet-1-0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-bash-completion");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-perl-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python-ctypes");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-python-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-ruby");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-ruby-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-server-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:subversion-tools-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/31");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/08");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1|SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1 / 13.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_gnome_keyring-1-0-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_kwallet-1-0-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-bash-completion-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-debugsource-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-devel-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-perl-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-perl-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-python-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-python-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-ruby-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-ruby-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-server-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-server-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-tools-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"subversion-tools-debuginfo-1.8.13-2.36.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_gnome_keyring-1-0-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_gnome_keyring-1-0-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_kwallet-1-0-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libsvn_auth_kwallet-1-0-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-bash-completion-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-debugsource-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-devel-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-perl-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-perl-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-ctypes-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-python-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-ruby-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-ruby-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-server-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-server-debuginfo-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-tools-1.8.13-2.14.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"subversion-tools-debuginfo-1.8.13-2.14.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libsvn_auth_gnome_keyring-1-0 / etc");
    }
    

Redhat

advisories
  • rhsa
    idRHSA-2015:1633
  • rhsa
    idRHSA-2015:1742
rpms
  • mod_dav_svn-0:1.6.11-15.el6_7
  • subversion-0:1.6.11-15.el6_7
  • subversion-debuginfo-0:1.6.11-15.el6_7
  • subversion-devel-0:1.6.11-15.el6_7
  • subversion-gnome-0:1.6.11-15.el6_7
  • subversion-javahl-0:1.6.11-15.el6_7
  • subversion-kde-0:1.6.11-15.el6_7
  • subversion-perl-0:1.6.11-15.el6_7
  • subversion-ruby-0:1.6.11-15.el6_7
  • subversion-svn2cl-0:1.6.11-15.el6_7
  • mod_dav_svn-0:1.7.14-7.ael7b_1.1
  • mod_dav_svn-0:1.7.14-7.el7_1.1
  • subversion-0:1.7.14-7.ael7b_1.1
  • subversion-0:1.7.14-7.el7_1.1
  • subversion-debuginfo-0:1.7.14-7.ael7b_1.1
  • subversion-debuginfo-0:1.7.14-7.el7_1.1
  • subversion-devel-0:1.7.14-7.ael7b_1.1
  • subversion-devel-0:1.7.14-7.el7_1.1
  • subversion-gnome-0:1.7.14-7.ael7b_1.1
  • subversion-gnome-0:1.7.14-7.el7_1.1
  • subversion-javahl-0:1.7.14-7.ael7b_1.1
  • subversion-javahl-0:1.7.14-7.el7_1.1
  • subversion-kde-0:1.7.14-7.ael7b_1.1
  • subversion-kde-0:1.7.14-7.el7_1.1
  • subversion-libs-0:1.7.14-7.ael7b_1.1
  • subversion-libs-0:1.7.14-7.el7_1.1
  • subversion-perl-0:1.7.14-7.ael7b_1.1
  • subversion-perl-0:1.7.14-7.el7_1.1
  • subversion-python-0:1.7.14-7.ael7b_1.1
  • subversion-python-0:1.7.14-7.el7_1.1
  • subversion-ruby-0:1.7.14-7.ael7b_1.1
  • subversion-ruby-0:1.7.14-7.el7_1.1
  • subversion-tools-0:1.7.14-7.ael7b_1.1
  • subversion-tools-0:1.7.14-7.el7_1.1