GLSA-200405-14 : Buffer overflow in Subversion

High Nessus Plugin ID 14500


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200405-14 (Buffer overflow in Subversion)

All releases of Subversion prior to 1.0.3 have a vulnerability in the date-parsing code. This vulnerability may allow denial of service or arbitrary code execution as the Subversion user. Both the client and server are vulnerable, and write access is NOT required to the server's repository.
Impact :

All servers and clients are vulnerable. Specifically, clients that allow other users to write to administrative files in a working copy may be exploited. Additionally all servers (whether they are httpd/DAV or svnserve) are vulnerable. Write access to the server is not required; public read-only Subversion servers are also exploitable.
Workaround :

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version.


All Subversion users should upgrade to the latest stable version:
# emerge sync # emerge -pv '>=dev-util/subversion-1.0.3' # emerge '>=dev-util/subversion-1.0.3'

See Also

Plugin Details

Severity: High

ID: 14500

File Name: gentoo_GLSA-200405-14.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2004/08/30

Modified: 2015/04/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:subversion, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2004/05/20

Vulnerability Publication Date: 2004/05/19

Exploitable With


Metasploit (Subversion Date Svnserve)

Reference Information

CVE: CVE-2004-0397

OSVDB: 6301

GLSA: 200405-14