First published: Mon May 30 2011(Updated: )
A NULL pointer dereference flaw was found in the way mod_dav_svn module of the subversion concurrent version control system processed requests submitted against the URL of a baselined resource. A remote attacker could use this flaw to cause the httpd child process to crash. Acknowledgements: Red Hat would like to thank the Apache Subversion project for reporting this issue. Upstream acknowledges Joe Schaefer of Apache Software Foundation as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CollabNet Subversion | <1.6.17 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu Linux | =11.04 | |
Debian GNU/Linux | =5.0 | |
Debian GNU/Linux | =6.0 | |
Fedoraproject Fedora | =14 | |
Fedoraproject Fedora | =15 | |
Apple iOS and macOS | <10.7.3 | |
Debian | =5.0 | |
Debian | =6.0 | |
Fedora | =15 | |
Fedora | =14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1752 is considered a moderate severity vulnerability due to its potential to crash the httpd child process.
To fix CVE-2011-1752, upgrade your Apache Subversion to version 1.6.17 or later.
CVE-2011-1752 affects Apache Subversion versions prior to 1.6.17 across various operating systems.
Yes, CVE-2011-1752 can be exploited remotely, allowing attackers to crash the server.
While upgrading is the best solution, a temporary workaround may include restricting access to vulnerable resources.