CVE-2016-2167

The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt Vendor Advisory
http://www.debian.org/security/2016/dsa-3561
http://www.securityfocus.com/bid/89417
http://www.securitytracker.com/id/1035706
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
https://security.gentoo.org/glsa/201610-05
https://www.oracle.com/security-alerts/cpuoct2020.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt Vendor Advisory
http://www.debian.org/security/2016/dsa-3561
http://www.securityfocus.com/bid/89417
http://www.securitytracker.com/id/1035706
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
https://security.gentoo.org/glsa/201610-05
https://www.oracle.com/security-alerts/cpuoct2020.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:47

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html -
References () http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html - () http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html -
References () http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html - () http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html -
References () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E - () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E -
References () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E - () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E -
References () http://subversion.apache.org/security/CVE-2016-2167-advisory.txt - Vendor Advisory () http://subversion.apache.org/security/CVE-2016-2167-advisory.txt - Vendor Advisory
References () http://www.debian.org/security/2016/dsa-3561 - () http://www.debian.org/security/2016/dsa-3561 -
References () http://www.securityfocus.com/bid/89417 - () http://www.securityfocus.com/bid/89417 -
References () http://www.securitytracker.com/id/1035706 - () http://www.securitytracker.com/id/1035706 -
References () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 - () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496 -
References () https://security.gentoo.org/glsa/201610-05 - () https://security.gentoo.org/glsa/201610-05 -
References () https://www.oracle.com/security-alerts/cpuoct2020.html - () https://www.oracle.com/security-alerts/cpuoct2020.html -

07 Nov 2023, 02:31

Type Values Removed Values Added
References
  • {'url': 'http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E', 'name': '[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.9.4 released', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E', 'name': '[subversion-announce] 20160428 [ANNOUNCE][SECURITY] Apache Subversion 1.8.16 released', 'tags': [], 'refsource': 'MLIST'}
  • () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E -
  • () http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E -

Information

Published : 2016-05-05 18:59

Updated : 2024-11-21 02:47


NVD link : CVE-2016-2167

Mitre link : CVE-2016-2167

CVE.ORG link : CVE-2016-2167


JSON object : View

Products Affected

apache

  • subversion
CWE
CWE-284

Improper Access Control