📄 svn-sscanf-advisory.txt
字号:
Subversion versions up to and including 1.0.2 have a buffer overflow inthe date parsing code.Both client and server are vulnerable. The server is vulnerable overboth httpd/DAV and svnserve (that is, over http://, https://, svn://,svn+ssh:// and other tunneled svn+*:// methods).Additionally, clients with shared working copies, or permissions thatallow files in the administrative area of the working copy to bewritten by other users, are potentially exploitable.Severity:=========Severity ranges from "Denial of Service" to, potentially, "ArbitraryCode Execution", depending upon how skilled the attacker is and theABI specifics of your platform.The server vulnerabilities can be triggered without write/commit accessto the repository. So repositories with anonymous/public read accessare vulnerable.Workarounds:============There are no workarounds except to disallow public access. Even thenyou'd still be vulnerable to attack by someone who still has access(perhaps you trust those people, though).Recommendations:================We recommend all users upgrade to 1.0.3.References:===========CAN-2004-0397: subversion sscanf stack overflow via revision date in REPORT queryNote:=====There was a similar vulnerability in the Neon HTTP library up to and includingversion 0.24.5. Because Subversion ships with Neon, we have included (inSubversion 1.0.3) Neon 0.24.6, which is being released simultaneously.Subversion does not actually invoke the vulnerable code in Neon; we areupdating our copy of Neon simply as a reassuring gesture, so people don'tworry. See CAN-2004-0398 for details.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -