CVE-2016-2168
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/05/2016
Last modified:
12/04/2025
Description
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* | 1.8.15 (including) | |
| cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89320
- http://www.securitytracker.com/id/1035707
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89320
- http://www.securitytracker.com/id/1035707
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html



