First published: Wed Jan 05 2011(Updated: )
A NULL pointer dereference flaw was found in the way mod_dav_svn, Apache httpd module for Subversion server, processed certain requests to display collection of Subversion repositories, available on particular host, when listing of repositories (SVNListParentPath directive) was enabled. A remote user could use this flaw to cause denial of service (particular httpd thread crash). References: [1] <a href="http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES">http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES</a> Upstream changeset: [2] <a href="http://svn.apache.org/viewvc?view=revision&revision=1033166">http://svn.apache.org/viewvc?view=revision&revision=1033166</a> Public PoC: [3] <a href="http://svn.haxx.se/users/archive-2010-11/0084.shtml">http://svn.haxx.se/users/archive-2010-11/0084.shtml</a> Flaw exploitation note: ----------------------- This flaw to be successfully exploited requires the "SVNListParentPath" directive / listing of repositories to be enabled. This feature is turned off by default in versions of subversion package, as shipped with Red Hat Enterprise Linux 5 and 6, which prevents occurrence / exploitation of this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Subversion | =1.2.0 | |
Subversion | =1.0.4 | |
Subversion | =1.6.10 | |
Subversion | =0.22.0 | |
Subversion | =1.0.8 | |
Subversion | =1.4.5 | |
Subversion | =1.0.2 | |
Subversion | =1.1.2 | |
Subversion | =0.26.0 | |
Subversion | =0.10.1 | |
Subversion | =0.15 | |
Subversion | =1.0.9 | |
Subversion | =1.4.2 | |
Subversion | =0.37.0 | |
Subversion | =m2 | |
Subversion | =1.6.2 | |
Subversion | =0.9 | |
Subversion | =0.7 | |
Subversion | =0.19.0 | |
Subversion | =0.22.2 | |
Subversion | =0.12.0 | |
Subversion | =1.5.5 | |
Subversion | =1.6.5 | |
Subversion | =0.13.1 | |
Subversion | =1.1.1 | |
Subversion | =0.19.1 | |
Subversion | =1.5.3 | |
Subversion | =1.2.3 | |
Subversion | =0.20.0 | |
Subversion | =1.4.0 | |
Subversion | =0.14.5 | |
Subversion | =0.24.0 | |
Subversion | =1.4.4 | |
Subversion | =1.5.7 | |
Subversion | =0.21.0 | |
Subversion | =0.14.0 | |
Subversion | =0.17.0 | |
Subversion | =1.4.6 | |
Subversion | =1.3.1 | |
Subversion | =0.14.3 | |
Subversion | =1.6.3 | |
Subversion | =1.6.8 | |
Subversion | =0.18.1 | |
Subversion | =0.35.0 | |
Subversion | =0.30.0 | |
Subversion | =0.18.0 | |
Subversion | =1.6.13 | |
Subversion | =0.17.1 | |
Subversion | =1.0.3 | |
Subversion | =0.28.0 | |
Subversion | =0.33.1 | |
Subversion | =0.27.0 | |
Subversion | =0.10.0 | |
Subversion | =1.6.0 | |
Subversion | =1.1.4 | |
Subversion | =1.5.8 | |
Subversion | =0.10.2 | |
Subversion | =1.5.2 | |
Subversion | =0.25.0 | |
Subversion | <=1.6.14 | |
Subversion | =1.0.6 | |
Subversion | =1.6.7 | |
Subversion | =1.0.1 | |
Subversion | =0.36.0 | |
Subversion | =1.3.2 | |
Subversion | =1.6.12 | |
Subversion | =0.33.0 | |
Subversion | =0.24.1 | |
Subversion | =0.6 | |
Subversion | =0.14.2 | |
Subversion | =1.0.5 | |
Subversion | =1.6.1 | |
Subversion | =0.16 | |
Subversion | =0.24.2 | |
Subversion | =1.6.4 | |
Subversion | =1.2.1 | |
Subversion | =0.28.1 | |
Subversion | =0.11.1 | |
Subversion | =m1 | |
Subversion | =0.13.0 | |
Subversion | =0.28.2 | |
Subversion | =0.22.1 | |
Subversion | =1.4.3 | |
Subversion | =0.16.1 | |
Subversion | =0.23.0 | |
Subversion | =1.5.4 | |
Subversion | =1.3.0 | |
Subversion | =0.34.0 | |
Subversion | =0.13.2 | |
Subversion | =0.35.1 | |
Subversion | =m4\/m5 | |
Subversion | =1.6.11 | |
Subversion | =0.32.1 | |
Subversion | =1.1.3 | |
Subversion | =1.2.2 | |
Subversion | =1.1.0 | |
Subversion | =1.5.1 | |
Subversion | =0.8 | |
Subversion | =1.5.6 | |
Subversion | =1.0.7 | |
Subversion | =1.5.0 | |
Subversion | =0.31.0 | |
Subversion | =1.0.0 | |
Subversion | =1.6.6 | |
Subversion | =1.6.9 | |
Subversion | =0.14.1 | |
Subversion | =0.29.0 | |
Subversion | =1.4.1 | |
Subversion | =m3 | |
Subversion | =0.14.4 | |
Subversion | =0.20.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4539 has a severity rating of medium due to the potential for remote code execution via NULL pointer dereference.
To fix CVE-2010-4539, update your Apache Subversion installation to version 1.6.14 or later.
CVE-2010-4539 affects multiple versions of Apache Subversion, including 0.7.0 up to 1.6.14.
Yes, CVE-2010-4539 can be exploited remotely under certain conditions where SVNListParentPath is enabled.
CVE-2010-4539 is classified as a NULL pointer dereference vulnerability.