First published: Fri Mar 29 2013(Updated: )
It was found that Subversion's mod_dav_svn Apache HTTPD server module will crash when a log REPORT request receives a limit that is out of the allowed range. This can lead to a DoS. Acknowledgements: Red Hat would like to thank the Apache Subversion for reporting this issue. Upstream acknowledges Greg McMullin, Stefan Fuhrmann, Philip Martin and Ben Reser as the original reporters of this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Subversion | <1.7.9 | 1.7.9 |
Subversion | =1.7.0 | |
Subversion | =1.7.1 | |
Subversion | =1.7.2 | |
Subversion | =1.7.3 | |
Subversion | =1.7.4 | |
Subversion | =1.7.5 | |
Subversion | =1.7.6 | |
Subversion | =1.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1884 has been classified as a moderate severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2013-1884, upgrade your Subversion installation to version 1.7.9 or later.
CVE-2013-1884 affects Subversion versions 1.7.0 through 1.7.8.
CVE-2013-1884 can be exploited to perform a denial of service attack against the Apache HTTPD server running the mod_dav_svn module.
CVE-2013-1884 is not specific to any operating systems, but rather affects installations of Subversion and Apache HTTPD regardless of platform.