CVE-2015-5259

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

References

http://subversion.apache.org/security/CVE-2015-5259-advisory.txt

http://www.securityfocus.com/bid/82300

http://www.securitytracker.com/id/1034469

https://security.gentoo.org/glsa/201610-05

Details

Source: MITRE

Published: 2016-01-08

Updated: 2017-07-01

Type: CWE-119

Risk Information

CVSS v2

Base Score: 9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C

Impact Score: 8.5

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Impact Score: 4.7

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (6 total)

IDNameProductFamilySeverity
93992GLSA-201610-05 : Subversion, Serf: Multiple VulnerabilitiesNessusGentoo Local Security Checks
high
90269Amazon Linux AMI : mod_dav_svn / subversion (ALAS-2016-676)NessusAmazon Linux Local Security Checks
high
89372Fedora 23 : subversion-1.9.3-1.fc23 (2015-afdb0e8aaa)NessusFedora Local Security Checks
high
89276Fedora 22 : subversion-1.8.15-1.fc22 (2015-6efa349a85)NessusFedora Local Security Checks
high
9069Apache Subversion 1.9.x < 1.9.3 Buffer OverflowNessus Network MonitorWeb Servers
high
87388FreeBSD : subversion -- multiple vulnerabilities (daadef86-a366-11e5-8b40-20cf30e32f6d)NessusFreeBSD Local Security Checks
high