Rapid7 Vulnerability & Exploit Database

RHSA-2011:0257: subversion security update

Back to Search

RHSA-2011:0257: subversion security update

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
01/07/2011
Created
07/25/2018
Added
02/24/2011
Modified
07/04/2017

Description

Subversion (SVN) is a concurrent version control system which enables oneor more users to collaborate in developing and maintaining a hierarchy offiles and directories while keeping a history of all changes.A server-side memory leak was found in the Subversion server. If amalicious, remote user performed "svn blame" or "svn log" operations oncertain repository files, it could cause the Subversion server to consumea large amount of system memory. (CVE-2010-4644)A NULL pointer dereference flaw was found in the way the mod_dav_svn module(for use with the Apache HTTP Server) processed certain requests. If amalicious, remote user issued a certain type of request to display acollection of Subversion repositories on a host that has theSVNListParentPath directive enabled, it could cause the httpd processserving the request to crash. Note that SVNListParentPath is not enabled bydefault. (CVE-2010-4539)All Subversion users should upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdated packages, the Subversion server must be restarted for the updateto take effect: restart httpd if you are using mod_dav_svn, or restartsvnserve if it is used.

Solution(s)

  • redhat-upgrade-mod_dav_svn
  • redhat-upgrade-subversion
  • redhat-upgrade-subversion-devel
  • redhat-upgrade-subversion-javahl
  • redhat-upgrade-subversion-perl
  • redhat-upgrade-subversion-ruby

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;