CVE-2015-5259

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://subversion.apache.org/security/CVE-2015-5259-advisory.txt - Vendor Advisory () http://subversion.apache.org/security/CVE-2015-5259-advisory.txt - Vendor Advisory
References () http://www.securityfocus.com/bid/82300 - () http://www.securityfocus.com/bid/82300 -
References () http://www.securitytracker.com/id/1034469 - () http://www.securitytracker.com/id/1034469 -
References () https://security.gentoo.org/glsa/201610-05 - () https://security.gentoo.org/glsa/201610-05 -

Information

Published : 2016-01-08 19:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5259

Mitre link : CVE-2015-5259

CVE.ORG link : CVE-2015-5259


JSON object : View

Products Affected

apache

  • subversion
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-189

Numeric Errors