Korean
<< Back
VID 23074
Severity 40
Port 3690
Protocol TCP
Class Subversion
Detailed Description The Subversion server, according to its version number, has a buffer overflow vulnerability in the date parsing function.
Subversion is a concurrent version control system for most Linux and Unix-based operating systems. Subversion versions 1.0.2 and earlier are vulnerable to a stack based buffer overflow, caused by a flaw in the date parsing functions of the application. Specifically, Subversion calls a sscanf() function when converting data strings to different formats. This causes user-supplied data to be copied into an unspecified buffer without proper boundary checks performed by the application.
By sending a specially crafted request via a DAV2 REPORT query or get-dated-rev svn-protocol command, a remote attacker could overflow a buffer and crash the service or possibly execute arbitrary code on the system with privileges of the affected Subversion server.

* Note: This check solely relied on the version number of the remote Subversion server to assess this vulnerability, so this might be a false positive.

* References:
http://osvdb.org/displayvuln.php?osvdb_id=6301
http://subversion.tigris.org/svn-sscanf-advisory.txt
http://security.e-matters.de/advisories/082004.html
http://www.gentoo.org/security/en/glsa/glsa-200405-14.xml

* Platforms Affected:
CollabNet, Inc., Subversion 1.0.2 and earlier
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Subversion (1.0.3 or later), available from the Subversion Web site at http://subversion.tigris.org/servlets/ProjectDocumentList?folderID=260
Related URL CVE-2004-0397 (CVE)
Related URL 10386 (SecurityFocus)
Related URL (ISS)