📄 can-2004-0413-advisory.txt
字号:
Subversion versions up to and including 1.0.4 have a potentialDenial of Service and Heap Overflow issue related to the parsing ofstrings in the 'svn://' family of access protocols.This affects only sites running svnserve. It does not affect'http://' access -- repositories served only by Apache/mod_dav_svndo not have this vulnerability.Details:========The svn protocol sends strings as a length followed by the string. Theparser would trust that the sender was providing an accurate length ofthe string and would allocate sufficent memory to store the entirestring. This would allow the sender of a string to Denial of Servicethe other side by suggesting that the string is very large.Additionally, if the size given is large enough it may cause the integerholding the size to wrap, thus allocating less memory than the stringlength and resulting in a heap overflow.The parsing code with the flaw is shared by both the svnserve server andclients using the svn://, svn+ssh:// and other tunneled svn+*://methods.Severity:=========Severity ranges from "Denial of Service" to, potentially, "ArbitraryCode Execution", depending upon how skilled the attacker is and theABI specifics of your platform.Since the error is in the parsing of the protocol, including the parsingof authentication, the server vulnerabilities can be triggered withoutread or write access to the repository. So any svnserve process that anattacker can connect to is vulnerable even if they do not have read orwrite access.The Denial of Service attack is reasonably easy to carry out, whileexploiting the heap overflow is more difficult. There are no knownexploits in the wild at the time of this advisory.Workarounds:============Disable svnserve and use DAV (http://) instead.Recommendations:================We recommend all users upgrade to 1.0.5.References:===========CAN-2004-0413: Subversion svn:// protocol string parsing error.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -