CVE-2015-0251

The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
References
Link Resource
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1633.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1742.html
http://seclists.org/fulldisclosure/2015/Jun/32
http://subversion.apache.org/security/CVE-2015-0251-advisory.txt Vendor Advisory
http://www.debian.org/security/2015/dsa-3231
http://www.mandriva.com/security/advisories?name=MDVSA-2015:192 Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.securityfocus.com/bid/74259
http://www.securitytracker.com/id/1033214
http://www.ubuntu.com/usn/USN-2721-1
https://security.gentoo.org/glsa/201610-05
https://support.apple.com/HT205217 Third Party Advisory
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1633.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1742.html
http://seclists.org/fulldisclosure/2015/Jun/32
http://subversion.apache.org/security/CVE-2015-0251-advisory.txt Vendor Advisory
http://www.debian.org/security/2015/dsa-3231
http://www.mandriva.com/security/advisories?name=MDVSA-2015:192 Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html Third Party Advisory
http://www.securityfocus.com/bid/74259
http://www.securitytracker.com/id/1033214
http://www.ubuntu.com/usn/USN-2721-1
https://security.gentoo.org/glsa/201610-05
https://support.apple.com/HT205217 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:22

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html - Mailing List () http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html - Mailing List
References () http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1633.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-1633.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1742.html - () http://rhn.redhat.com/errata/RHSA-2015-1742.html -
References () http://seclists.org/fulldisclosure/2015/Jun/32 - () http://seclists.org/fulldisclosure/2015/Jun/32 -
References () http://subversion.apache.org/security/CVE-2015-0251-advisory.txt - Vendor Advisory () http://subversion.apache.org/security/CVE-2015-0251-advisory.txt - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3231 - () http://www.debian.org/security/2015/dsa-3231 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:192 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2015:192 - Broken Link
References () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory
References () http://www.securityfocus.com/bid/74259 - () http://www.securityfocus.com/bid/74259 -
References () http://www.securitytracker.com/id/1033214 - () http://www.securitytracker.com/id/1033214 -
References () http://www.ubuntu.com/usn/USN-2721-1 - () http://www.ubuntu.com/usn/USN-2721-1 -
References () https://security.gentoo.org/glsa/201610-05 - () https://security.gentoo.org/glsa/201610-05 -
References () https://support.apple.com/HT205217 - Third Party Advisory () https://support.apple.com/HT205217 - Third Party Advisory

Information

Published : 2015-04-08 18:59

Updated : 2024-11-21 02:22


NVD link : CVE-2015-0251

Mitre link : CVE-2015-0251

CVE.ORG link : CVE-2015-0251


JSON object : View

Products Affected

opensuse

  • opensuse

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation

apple

  • xcode

apache

  • subversion

oracle

  • solaris
CWE
CWE-345

Insufficient Verification of Data Authenticity