First published: Fri Nov 22 2013(Updated: )
A flaw was found in the way mod_dav_svn handled certain requests when SVNAutoversioning (in "/etc/httpd/conf.d/subversion.conf", for example) was enabled. If an attacker with commit access to a repository sent a request containing a crafted URL, it would cause the httpd process serving the request to crash. This issue affected Subversion versions 1.7.11 to 1.7.13, and 1.8.1 to 1.8.4. It has been corrected in versions 1.7.14 and 1.8.5. This issue does not affect the versions of Subversion in Red Hat Enterprise Linux 5 and 6. Acknowledgements: Red Hat would like to thank the Apache Subversion project for reporting this issue. Upstream acknowledges Philip Martin as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/subversion | <1.7.14 | 1.7.14 |
redhat/subversion | <1.8.5 | 1.8.5 |
Apache mod_dav_svn | ||
Subversion | =1.7.11 | |
Subversion | =1.7.12 | |
Subversion | =1.7.13 | |
Subversion | =1.8.1 | |
Subversion | =1.8.2 | |
Subversion | =1.8.3 | |
Subversion | =1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4558 has a moderate severity rating due to its potential impact on server operations if exploited.
To fix CVE-2013-4558, upgrade subversion to version 1.7.14 or 1.8.5 or later.
CVE-2013-4558 affects users of mod_dav_svn when autoversioning is enabled in Apache Subversion.
Exploitation of CVE-2013-4558 may lead to abnormal termination of the httpd process serving requests.
Disabling SVNAutoversioning in the configuration may serve as a temporary workaround for CVE-2013-4558.