CVE-2015-5343

Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://subversion.apache.org/security/CVE-2015-5343-advisory.txt - Vendor Advisory () http://subversion.apache.org/security/CVE-2015-5343-advisory.txt - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3424 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3424 - Third Party Advisory
References () http://www.securitytracker.com/id/1034470 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034470 - Third Party Advisory, VDB Entry
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261 - Third Party Advisory () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261 - Third Party Advisory

Information

Published : 2016-04-14 14:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5343

Mitre link : CVE-2015-5343

CVE.ORG link : CVE-2015-5343


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • subversion
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer