CVE-2011-0715

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.

References

http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056071.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056072.html

http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056736.html

http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html

http://secunia.com/advisories/43583

http://secunia.com/advisories/43603

http://secunia.com/advisories/43672

http://secunia.com/advisories/43794

http://securitytracker.com/id?1025161

http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.479953

http://subversion.apache.org/security/CVE-2011-0715-advisory.txt

http://support.apple.com/kb/HT4723

http://svn.apache.org/repos/asf/subversion/tags/1.6.16/CHANGES

http://svn.apache.org/viewvc?view=revision&revision=1071239

http://svn.apache.org/viewvc?view=revision&revision=1071307

http://svn.haxx.se/dev/archive-2011-03/0122.shtml

http://www.debian.org/security/2011/dsa-2181

http://www.mandriva.com/security/advisories?name=MDVSA-2011:067

http://www.osvdb.org/70964

http://www.securityfocus.com/bid/46734

http://www.ubuntu.com/usn/USN-1096-1

http://www.vupen.com/english/advisories/2011/0567

http://www.vupen.com/english/advisories/2011/0568

http://www.vupen.com/english/advisories/2011/0624

http://www.vupen.com/english/advisories/2011/0660

http://www.vupen.com/english/advisories/2011/0684

http://www.vupen.com/english/advisories/2011/0776

http://www.vupen.com/english/advisories/2011/0885

https://bugzilla.redhat.com/show_bug.cgi?id=680755

https://exchange.xforce.ibmcloud.com/vulnerabilities/65876

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18967

https://rhn.redhat.com/errata/RHSA-2011-0327.html

https://rhn.redhat.com/errata/RHSA-2011-0328.html

Details

Source: MITRE

Published: 2011-03-11

Updated: 2017-09-19

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:* versions up to 1.6.15 (inclusive)

cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*

cpe:2.3:a:apache:subversion:m4\/m5:*:*:*:*:*:*:*

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
75922openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0238-1)NessusSuSE Local Security Checks
medium
75617openSUSE Security Update : libsvn_auth_gnome_keyring-1-0 (openSUSE-SU-2011:0693-1)NessusSuSE Local Security Checks
medium
70084GLSA-201309-11 : Subversion: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
68221Oracle Linux 6 : subversion (ELSA-2011-0328)NessusOracle Linux Local Security Checks
medium
68220Oracle Linux 5 : subversion (ELSA-2011-0327)NessusOracle Linux Local Security Checks
medium
60982Scientific Linux Security Update : subversion on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
57173SuSE 10 Security Update : subversion (ZYPP Patch Number 7560)NessusSuSE Local Security Checks
medium
55416Mac OS X 10.6.x < 10.6.8 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
55415Mac OS X Multiple Vulnerabilities (Security Update 2011-004)NessusMacOS X Local Security Checks
high
800790Mac OS X 10.6 < 10.6.8 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5968Mac OS X 10.6 < 10.6.8 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
53425CentOS 5 : subversion (CESA-2011:0327)NessusCentOS Local Security Checks
medium
53309Mandriva Linux Security Advisory : subversion (MDVSA-2011:067)NessusMandriva Local Security Checks
medium
53220Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : subversion vulnerability (USN-1096-1)NessusUbuntu Local Security Checks
medium
52985Fedora 15 : subversion-1.6.16-1.fc15 (2011-3775)NessusFedora Local Security Checks
medium
52693Fedora 13 : subversion-1.6.16-1.fc13 (2011-2698)NessusFedora Local Security Checks
medium
52692Fedora 14 : subversion-1.6.16-1.fc14 (2011-2657)NessusFedora Local Security Checks
medium
52635Slackware 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : subversion (SSA:2011-070-01)NessusSlackware Local Security Checks
medium
52595RHEL 6 : subversion (RHSA-2011:0328)NessusRed Hat Local Security Checks
medium
52594RHEL 5 : subversion (RHSA-2011:0327)NessusRed Hat Local Security Checks
medium
52563FreeBSD : subversion -- remote HTTP DoS vulnerability (e27ca763-4721-11e0-bdc4-001e8c75030d)NessusFreeBSD Local Security Checks
medium
52548Debian DSA-2181-1 : subversion - denial of serviceNessusDebian Local Security Checks
medium