svn-sscanf-advisory.txt

来自「linux subdivision ying gai ke yi le ba」· 文本 代码 · 共 50 行

TXT
50
字号
Subversion versions up to and including 1.0.2 have a buffer overflow inthe date parsing code.Both client and server are vulnerable.  The server is vulnerable overboth httpd/DAV and svnserve (that is, over http://, https://, svn://,svn+ssh:// and other tunneled svn+*:// methods).Additionally, clients with shared working copies, or permissions thatallow files in the administrative area of the working copy to bewritten by other users, are potentially exploitable.Severity:=========Severity ranges from "Denial of Service" to, potentially, "ArbitraryCode Execution", depending upon how skilled the attacker is and theABI specifics of your platform.The server vulnerabilities can be triggered without write/commit accessto the repository.  So repositories with anonymous/public read accessare vulnerable.Workarounds:============There are no workarounds except to disallow public access.  Even thenyou'd still be vulnerable to attack by someone who still has access(perhaps you trust those people, though).Recommendations:================We recommend all users upgrade to 1.0.3.References:===========CAN-2004-0397: subversion sscanf stack overflow via revision date               in REPORT queryNote:=====There was a similar vulnerability in the Neon HTTP library up to and includingversion 0.24.5.  Because Subversion ships with Neon, we have included (inSubversion 1.0.3) Neon 0.24.6, which is being released simultaneously.Subversion does not actually invoke the vulnerable code in Neon; we areupdating our copy of Neon simply as a reassuring gesture, so people don'tworry.  See CAN-2004-0398 for details.

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?