First published: Mon May 30 2011(Updated: )
An infinite loop was found in the way mod_dav_svn module of the subversion concurrent version control system processed certain data sets, when SVNPathAuthz configuration directive with value of 'short_circuit' was used. A remote attacker could use this flaw to cause the httpd child process to consume excessive amount of system memory. Acknowledgements: Red Hat would like to thank the Apache Subversion project for reporting this issue. Upstream acknowledges Ivan Zhakov of VisualSVN as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Subversion | >=1.6.0<1.6.17 | |
Subversion | >=1.5.0<=1.5.8 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =10.04 | |
Debian Linux | =5.0 | |
Debian Linux | =6.0 | |
Red Hat Fedora | =15 | |
Red Hat Fedora | =14 | |
Apple iOS and macOS | <10.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1783 has a medium severity rating due to the potential for a denial of service attack.
To fix CVE-2011-1783, update to the latest version of Apache Subversion that addresses this vulnerability.
CVE-2011-1783 affects Apache Subversion versions between 1.5.0 and 1.6.17.
Yes, CVE-2011-1783 can be exploited remotely by an attacker to cause an infinite loop.
CVE-2011-1783 involves the mod_dav_svn module of the Apache Subversion system.