|
|||
Rule General Information |
---|
Release Date: | 2019-06-25 | |
Rule Name: | Apache Software Foundation Subversion Integer Overflow Vulnerability (CVE-2015-5343) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow. | |
Impact: | An attacker can exploit the affected software with a integer overflow vulnerability. Successful exploit leads to execute arbitrary code, and failed exploit may disturb the software logic and cause denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityTrackerID:1034470 http://subversion.apache.org/security/CVE-2015-5343-advisory.txt http://www.debian.org/security/2015/dsa-3424 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://subversion.apache.org/security/CVE-2015-5343-advisory.txt |