ASA-201908-10 log generated external raw
[ASA-201908-10] subversion: denial of service |
---|
Arch Linux Security Advisory ASA-201908-10
==========================================
Severity: High
Date : 2019-08-16
CVE-ID : CVE-2018-11782 CVE-2019-0203
Package : subversion
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1016
Summary
=======
The package subversion before version 1.12.2-1 is vulnerable to denial
of service.
Resolution
==========
Upgrade to 1.12.2-1.
# pacman -Syu "subversion>=1.12.2-1"
The problems have been fixed upstream in version 1.12.2.
Workaround
==========
None.
Description
===========
- CVE-2018-11782 (denial of service)
Subversion svn:// connections, including svn+ssh:// and
svn+<custom>://, use a custom network protocol [1] with Lisp-like
syntax. The code implementing the protocol has dedicated codepaths for
serialization of revision numbers into protocol integers. A particular
client query could cause the server to attempt to reply with a revision
number whose value is the invalid revision number constant
`SVN_INVALID_REVNUM`, thereby triggering an assertion failure in the
the serialization layer.
- CVE-2019-0203 (denial of service)
A null-pointer-dereference has been found in svnserve that results in a
remote unauthenticated Denial-of-Service in some server configurations.
The vulnerability can be triggered by an unauthenticated user if the
server is configured with anonymous access enabled.
Impact
======
A remote attacker is able to cause a denial of service by sending a
special packet.
References
==========
http://subversion.apache.org/security/CVE-2018-11782-advisory.txt
http://subversion.apache.org/security/CVE-2019-0203-advisory.txt
https://security.archlinux.org/CVE-2018-11782
https://security.archlinux.org/CVE-2019-0203
|