CVE-2014-0032
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
14/02/2014
Last modified:
11/04/2025
Description
The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* | 1.7.14 (including) | |
cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E
- http://rhn.redhat.com/errata/RHSA-2014-0255.html
- http://secunia.com/advisories/56822
- http://secunia.com/advisories/60722
- http://secunia.com/advisories/61321
- http://support.apple.com/kb/HT6444
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.osvdb.org/102927
- http://www.securityfocus.com/bid/65434
- http://www.ubuntu.com/usn/USN-2316-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90986
- https://security.gentoo.org/glsa/201610-05
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00086.html
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00011.html
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C52D328AB.8090502%40reser.org%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3C871u0gqb0d.fsf%40ntlworld.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-dev/201401.mbox/%3CCANvU9scLHr2yOLABW8q6_wNzhEf7pWM=NiavGcobqvUuyhKyAA%40mail.gmail.com%3E
- http://rhn.redhat.com/errata/RHSA-2014-0255.html
- http://secunia.com/advisories/56822
- http://secunia.com/advisories/60722
- http://secunia.com/advisories/61321
- http://support.apple.com/kb/HT6444
- http://svn.apache.org/repos/asf/subversion/tags/1.7.15/CHANGES
- http://svn.apache.org/repos/asf/subversion/tags/1.8.6/CHANGES
- http://svn.apache.org/viewvc?view=revision&revision=1557320
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.osvdb.org/102927
- http://www.securityfocus.com/bid/65434
- http://www.ubuntu.com/usn/USN-2316-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90986
- https://security.gentoo.org/glsa/201610-05