Computer Security
[EN] securityvulns.ru no-pyccku


Subversion / APR multiple buffer overflows
Published:08.08.2009
Source:
SecurityVulns ID:10127
Type:library
Threat Level:
7/10
Description:Multiple integer overflows in libsvn_delta library.
Affected:APACHE : Subversion 1.5
 SUBVERSION : Subversion 1.6
 APR : apr 0.9
 APR : apr 1.3
CVE:CVE-2009-2412 (Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.)
 CVE-2009-2411 (Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.)
Original documentdocumentMatt Lewis, Subversion heap overflow (08.08.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod