Korean
<< Back
VID 23076
Severity 40
Port 3690
Protocol TCP
Class Subversion
Detailed Description The Subversion server, according to its version number, has a heap overflow vulnerability in svn protocol.
Subversion is a concurrent version control system for most Linux and Unix-based operating systems. Subversion versions 1.0.4 and earlier are vulnerable to a heap overflow, caused by the processing of svn protocol. The svn protocol parser trusts the indicated length of a URI string sent by a client. This allows a client to specify a very long string, thereby causing svnserve to allocate enough memory to hold that string. This may cause a Denial of Service. Alternately, given a string that causes an integer overflow in the variable holding the string length, the server might allocate less memory than required, allowing a heap overflow.
By sending a specially-crafted svn packet, a remote unauthenticated attacker could overflow a buffer and crash the service or possibly execute arbitrary code on the system with privileges of the affected Subversion server.

* Note: This check solely relied on the version number of the remote Subversion server to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0294.html
http://www.securitytracker.com/alerts/2004/Jun/1010469.html

* Platforms Affected:
CollabNet, Inc., Subversion 1.0.4 and earlier
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Subversion (1.0.5 or later), available from the Subversion Web site at http://subversion.tigris.org/servlets/ProjectDocumentList?folderID=260
Related URL CVE-2004-0413 (CVE)
Related URL (SecurityFocus)
Related URL 16396 (ISS)