First published: Fri May 28 2004(Updated: )
Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and earlier allows remote attackers to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Subversion | =1.0.2 | |
Apache Subversion | =1.0.1 | |
Apache Subversion | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0397 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-0397, upgrade Subversion to version 1.0.3 or later.
CVE-2004-0397 affects Subversion versions 1.0.0, 1.0.1, and 1.0.2.
CVE-2004-0397 can be exploited via DAV2 REPORT queries or by using the get-dated-rev command in svn-protocol.
Users of Subversion versions 1.0.0 through 1.0.2 are at risk for CVE-2004-0397.