CVE-2010-4539

The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E
http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E
http://openwall.com/lists/oss-security/2011/01/02/1 Patch
http://openwall.com/lists/oss-security/2011/01/03/9
http://openwall.com/lists/oss-security/2011/01/04/10 Patch
http://openwall.com/lists/oss-security/2011/01/04/8 Patch
http://openwall.com/lists/oss-security/2011/01/05/4 Patch
http://secunia.com/advisories/42780 Vendor Advisory
http://secunia.com/advisories/42969
http://secunia.com/advisories/43115
http://secunia.com/advisories/43139
http://secunia.com/advisories/43346
http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES
http://svn.apache.org/viewvc?view=revision&revision=1033166 Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2011:006
http://www.redhat.com/support/errata/RHSA-2011-0257.html
http://www.redhat.com/support/errata/RHSA-2011-0258.html
http://www.securityfocus.com/bid/45655
http://www.securitytracker.com/id?1024934
http://www.ubuntu.com/usn/USN-1053-1
http://www.vupen.com/english/advisories/2011/0015 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0103
http://www.vupen.com/english/advisories/2011/0162
http://www.vupen.com/english/advisories/2011/0264
https://bugzilla.redhat.com/show_bug.cgi?id=667407 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64472
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E
http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E
http://openwall.com/lists/oss-security/2011/01/02/1 Patch
http://openwall.com/lists/oss-security/2011/01/03/9
http://openwall.com/lists/oss-security/2011/01/04/10 Patch
http://openwall.com/lists/oss-security/2011/01/04/8 Patch
http://openwall.com/lists/oss-security/2011/01/05/4 Patch
http://secunia.com/advisories/42780 Vendor Advisory
http://secunia.com/advisories/42969
http://secunia.com/advisories/43115
http://secunia.com/advisories/43139
http://secunia.com/advisories/43346
http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES
http://svn.apache.org/viewvc?view=revision&revision=1033166 Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2011:006
http://www.redhat.com/support/errata/RHSA-2011-0257.html
http://www.redhat.com/support/errata/RHSA-2011-0258.html
http://www.securityfocus.com/bid/45655
http://www.securitytracker.com/id?1024934
http://www.ubuntu.com/usn/USN-1053-1
http://www.vupen.com/english/advisories/2011/0015 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0103
http://www.vupen.com/english/advisories/2011/0162
http://www.vupen.com/english/advisories/2011/0264
https://bugzilla.redhat.com/show_bug.cgi?id=667407 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/64472
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:m4\/m5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html -
References () http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E - () http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E -
References () http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E - () http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E -
References () http://openwall.com/lists/oss-security/2011/01/02/1 - Patch () http://openwall.com/lists/oss-security/2011/01/02/1 - Patch
References () http://openwall.com/lists/oss-security/2011/01/03/9 - () http://openwall.com/lists/oss-security/2011/01/03/9 -
References () http://openwall.com/lists/oss-security/2011/01/04/10 - Patch () http://openwall.com/lists/oss-security/2011/01/04/10 - Patch
References () http://openwall.com/lists/oss-security/2011/01/04/8 - Patch () http://openwall.com/lists/oss-security/2011/01/04/8 - Patch
References () http://openwall.com/lists/oss-security/2011/01/05/4 - Patch () http://openwall.com/lists/oss-security/2011/01/05/4 - Patch
References () http://secunia.com/advisories/42780 - Vendor Advisory () http://secunia.com/advisories/42780 - Vendor Advisory
References () http://secunia.com/advisories/42969 - () http://secunia.com/advisories/42969 -
References () http://secunia.com/advisories/43115 - () http://secunia.com/advisories/43115 -
References () http://secunia.com/advisories/43139 - () http://secunia.com/advisories/43139 -
References () http://secunia.com/advisories/43346 - () http://secunia.com/advisories/43346 -
References () http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES - () http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES -
References () http://svn.apache.org/viewvc?view=revision&revision=1033166 - Patch () http://svn.apache.org/viewvc?view=revision&revision=1033166 - Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:006 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:006 -
References () http://www.redhat.com/support/errata/RHSA-2011-0257.html - () http://www.redhat.com/support/errata/RHSA-2011-0257.html -
References () http://www.redhat.com/support/errata/RHSA-2011-0258.html - () http://www.redhat.com/support/errata/RHSA-2011-0258.html -
References () http://www.securityfocus.com/bid/45655 - () http://www.securityfocus.com/bid/45655 -
References () http://www.securitytracker.com/id?1024934 - () http://www.securitytracker.com/id?1024934 -
References () http://www.ubuntu.com/usn/USN-1053-1 - () http://www.ubuntu.com/usn/USN-1053-1 -
References () http://www.vupen.com/english/advisories/2011/0015 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0015 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0103 - () http://www.vupen.com/english/advisories/2011/0103 -
References () http://www.vupen.com/english/advisories/2011/0162 - () http://www.vupen.com/english/advisories/2011/0162 -
References () http://www.vupen.com/english/advisories/2011/0264 - () http://www.vupen.com/english/advisories/2011/0264 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=667407 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=667407 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/64472 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/64472 -

Information

Published : 2011-01-07 19:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4539

Mitre link : CVE-2010-4539

CVE.ORG link : CVE-2010-4539


JSON object : View

Products Affected

apache

  • subversion
CWE
CWE-399

Resource Management Errors