libsvn_ra_svn in Subversion 1.0.4 trusts the length field of (1) svn://, (2) svn+ssh://, and (3) other svn protocol URL strings, which allows remote attackers to cause a denial of service (memory consumption) and possibly execute arbitrary code via an integer overflow that leads to a heap-based buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://subversion.tigris.org/security/CAN-2004-0413-advisory.txt - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200406-07.xml - Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2004_18_subversion.html - | |
References | () http://www.securityfocus.com/advisories/6847 - | |
References | () http://www.securityfocus.com/archive/1/365836 - | |
References | () http://www.securityfocus.com/bid/10519 - Patch, Vendor Advisory | |
References | () https://bugzilla.fedora.us/show_bug.cgi?id=1748 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16396 - |
Information
Published : 2004-08-06 04:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0413
Mitre link : CVE-2004-0413
CVE.ORG link : CVE-2004-0413
JSON object : View
Products Affected
subversion
- subversion
openpkg
- openpkg
CWE