CentOS 5 : subversion (CESA-2009:1203)

high Nessus Plugin ID 43775

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes.

Matt Lewis, of Google, reported multiple heap overflow flaws in Subversion (server and client) when parsing binary deltas. A malicious user with commit access to a server could use these flaws to cause a heap overflow on that server. A malicious server could use these flaws to cause a heap overflow on a client when it attempts to checkout or update. These heap overflows can result in a crash or, possibly, arbitrary code execution. (CVE-2009-2411)

All Subversion users should upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the updated packages, the Subversion server must be restarted for the update to take effect: restart httpd if you are using mod_dav_svn, or restart svnserve if it is used.

Solution

Update the affected subversion packages.

See Also

http://www.nessus.org/u?1f540e48

http://www.nessus.org/u?a7778999

Plugin Details

Severity: High

ID: 43775

File Name: centos_RHSA-2009-1203.nasl

Version: 1.14

Type: local

Agent: unix

Published: 1/6/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:centos:centos:subversion-javahl, p-cpe:/a:centos:centos:subversion-perl, p-cpe:/a:centos:centos:subversion-devel, p-cpe:/a:centos:centos:mod_dav_svn, cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:subversion, p-cpe:/a:centos:centos:subversion-ruby

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/11/2009

Vulnerability Publication Date: 8/7/2009

Reference Information

CVE: CVE-2009-2411

BID: 35983

CWE: 189

RHSA: 2009:1203