First published: Thu May 05 2016(Updated: )
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Subversion | <=1.8.15 | |
Subversion | =1.9.0 | |
Subversion | =1.9.1 | |
Subversion | =1.9.2 | |
Subversion | =1.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2168 has a moderate severity level due to the potential for a denial of service.
To fix CVE-2016-2168, you should update your Apache Subversion to version 1.8.16 or later or 1.9.4 or later.
CVE-2016-2168 can cause a denial of service by crashing the server due to a NULL pointer dereference.
Users of Apache Subversion versions prior to 1.8.16 and all 1.9.x versions before 1.9.4 are affected by CVE-2016-2168.
CVE-2016-2168 can be triggered by crafted header information in MOVE or COPY requests.