Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2004-128: subversion


Vulnerability Assessment Details

Fedora Core 2 2004-128: subversion

Vulnerability Assessment Summary
Check for the version of the subversion package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-128 (subversion).

Subversion is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a
hierarchy of files and directories while keeping a history of all
changes. Subversion only stores the differences between versions,
instead of every complete file. Subversion is intended to be a
compelling replacement for CVS.

Update Information:

Stefan Esser discovered an issue in the date parsing routines in
Subversion which permits a buffer overflow. A possible hacker could send
malicious requests to a Subversion server (either Apache-based using
mod_dav_svn, or using the svnserve daemon) and perform arbitrary
execution of code.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0397 to this issue. This update includes
packages with a patch for this issue.



Solution : http://www.fedoranews.org/updates/FEDORA-2004-128.shtml
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell PowerEdge M620 Blade 20-core 2.2 GHz E5-2662 v2 8GB RAM No HD 10GbE HPHS
$405.0
Dell PowerEdge M620 Blade 20-core 2.2 GHz E5-2662 v2 8GB RAM No HD 10GbE HPHS pictureIBM 44X1685 IBM Multi Processor Expansion Unit - Blade server expansion unit (2x
$67.0
IBM 44X1685 IBM Multi Processor Expansion Unit - Blade server expansion unit (2x pictureIBM 26K5934-OB IBM Multiprocessor Expansion Unit - Blade server expansion unit
$45.0
IBM 26K5934-OB IBM Multiprocessor Expansion Unit - Blade server expansion unit pictureDell PowerEdge M620 Blade 2x E5-2697v2 2.7Ghz 12 Core 256GB 2x 100GB SSDs H710
$2450.0
Dell PowerEdge M620 Blade 2x E5-2697v2 2.7Ghz 12 Core 256GB 2x 100GB SSDs H710 picture


Discussions

No Discussions have been posted on this vulnerability.