Vulnerability Details : CVE-2010-4539
The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2010-4539
Probability of exploitation activity in the next 30 days: 0.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-4539
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:C |
8.0
|
6.9
|
NIST |
CWE ids for CVE-2010-4539
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-4539
-
http://svn.apache.org/viewvc?view=revision&revision=1033166
[Apache-SVN] Revision 1033166Patch
-
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:005
-
http://www.ubuntu.com/usn/USN-1053-1
USN-1053-1: Subversion vulnerabilities | Ubuntu security notices
-
http://www.securitytracker.com/id?1024934
Subversion SVNParentPath Collection Processing Error Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053230.html
[SECURITY] Fedora 14 Update: subversion-1.6.15-1.fc14
-
http://openwall.com/lists/oss-security/2011/01/04/8
oss-security - Re: CVE request for subversionPatch
-
http://mail-archives.apache.org/mod_mbox/www-announce/201011.mbox/%3CAANLkTi=5+NOi-Cp=fKCx6mAW-TofFVW=ikEQkXgQB8Bt%40mail.gmail.com%3E
Apache Subversion 1.6.15 Released-Apache Mail Archives
-
http://www.redhat.com/support/errata/RHSA-2011-0258.html
Support
- http://svn.apache.org/repos/asf/subversion/tags/1.6.15/CHANGES
-
http://www.vupen.com/english/advisories/2011/0015
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0264
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2011/0103
Webmail | OVH- OVH
-
http://www.securityfocus.com/bid/45655
Apache Subversion Server Component Multiple Remote Denial Of Service Vulnerabilities
-
http://mail-archives.apache.org/mod_mbox/subversion-users/201011.mbox/%3C3923B919-C2BE-41AD-84ED-7207837FAD1A%40ncsa.illinois.edu%3E
apache coredump in mod_dav_svn-Apache Mail Archives
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:006
mandriva.com
-
http://openwall.com/lists/oss-security/2011/01/04/10
oss-security - Re: CVE request for subversionPatch
-
http://www.vupen.com/english/advisories/2011/0162
Webmail | OVH- OVH
-
https://bugzilla.redhat.com/show_bug.cgi?id=667407
667407 – (CVE-2010-4539) CVE-2010-4539 Subversion (mod_dav_svn): DoS (crash) by processing certain requests to display all available repositories to a web browserExploit;Patch
-
http://openwall.com/lists/oss-security/2011/01/05/4
oss-security - Re: CVE request for subversionPatch
-
http://openwall.com/lists/oss-security/2011/01/02/1
oss-security - CVE request for subversionPatch
-
http://openwall.com/lists/oss-security/2011/01/03/9
oss-security - Re: CVE request for subversion
-
http://www.redhat.com/support/errata/RHSA-2011-0257.html
Support
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/64472
Apache Subversion walk() denial of service CVE-2010-4539 Vulnerability Report
Products affected by CVE-2010-4539
- cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.20.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.16.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.20.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.21.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.25.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.37.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.19.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.19.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.24.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.24.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.29.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.28.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.35.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.35.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:m3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:m2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:m1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.36.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.18.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.22.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.23.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.28.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.28.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.34.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.33.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:m4\/m5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.24.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.31.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.30.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.33.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.17.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.17.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.18.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.22.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.22.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.27.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.26.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.32.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:subversion:0.13.1:*:*:*:*:*:*:*