CVE-2016-8734

Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.8.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:subversion:1.9.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3932 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3932 - Third Party Advisory
References () http://www.securityfocus.com/bid/94588 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94588 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037361 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037361 - Third Party Advisory, VDB Entry
References () https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E -
References () https://subversion.apache.org/security/CVE-2016-8734-advisory.txt - Issue Tracking, Vendor Advisory () https://subversion.apache.org/security/CVE-2016-8734-advisory.txt - Issue Tracking, Vendor Advisory
References () https://www.oracle.com/security-alerts/cpuoct2020.html - () https://www.oracle.com/security-alerts/cpuoct2020.html -

07 Nov 2023, 02:36

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09@%3Cannounce.apache.org%3E', 'name': '[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E -

Information

Published : 2017-10-16 13:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8734

Mitre link : CVE-2016-8734

CVE.ORG link : CVE-2016-8734


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • subversion
CWE
CWE-400

Uncontrolled Resource Consumption