ID

VAR-201408-0079


CVE

CVE-2014-3528


TITLE

Apache Subversion Security hole

Trust: 0.6

sources: CNNVD: CNNVD-201408-080

DESCRIPTION

Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm. Apache Subversion is prone to an insecure authentication weakness. A remote attacker can exploit this issue to obtain a user's authentication credentials. This may aid in further attacks. The system is compatible with the Concurrent Versions System (CVS). A security vulnerability exists in Apache Subversion 1.0.0 to 1.7.17 prior to 1.7.x and 1.8.10 prior to 1.8.x due to an MD5 conflict in the program's handling of cached credentials. Ben Reser discovered that Subversion did not correctly validate SSL certificates containing wildcards. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications (CVE-2014-3522). Bert Huijben discovered that Subversion did not properly handle cached credentials. The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVFl6JmqjQ0CJFipgRAgkVAJ4xKUzteqhyYcBC4AuYoZ7Lv3oQZQCfROhl NaJSaZq4W6qIMwD8fhQF5Ls= =R/mF -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2316-1 August 14, 2014 subversion vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in Subversion. Software Description: - subversion: Advanced version control system Details: Lieven Govaerts discovered that the Subversion mod_dav_svn module incorrectly handled certain request methods when SVNListParentPath was enabled. This issue only affected Ubuntu 12.04 LTS. (CVE-2014-3528) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libsvn1 1.8.8-1ubuntu3.1 subversion 1.8.8-1ubuntu3.1 Ubuntu 12.04 LTS: libapache2-svn 1.6.17dfsg-3ubuntu3.4 libsvn1 1.6.17dfsg-3ubuntu3.4 subversion 1.6.17dfsg-3ubuntu3.4 In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Subversion, Serf: Multiple Vulnerabilities Date: October 11, 2016 Bugs: #500482, #518716, #519202, #545348, #556076, #567810, #581448, #586046 ID: 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Subversion and Serf, the worst of which could lead to execution of arbitrary code. Background ========== Subversion is a version control system intended to eventually replace CVS. Like CVS, it has an optional client-server architecture (where the server can be an Apache server running mod_svn, or an ssh program as in CVS's :ext: method). In addition to supporting the features found in CVS, Subversion also provides support for moving and copying files and directories. The serf library is a high performance C-based HTTP client library built upon the Apache Portable Runtime (APR) library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-vcs/subversion < 1.9.4 >= 1.9.4 *> 1.8.16 2 net-libs/serf < 1.3.7 >= 1.3.7 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Subversion users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4" All Serf users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7" References ========== [ 1 ] CVE-2014-0032 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032 [ 2 ] CVE-2014-3504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504 [ 3 ] CVE-2014-3522 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522 [ 4 ] CVE-2014-3528 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528 [ 5 ] CVE-2015-0202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202 [ 6 ] CVE-2015-0248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248 [ 7 ] CVE-2015-0251 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251 [ 8 ] CVE-2015-3184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184 [ 9 ] CVE-2015-3187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187 [ 10 ] CVE-2015-5259 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259 [ 11 ] CVE-2016-2167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167 [ 12 ] CVE-2016-2168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201610-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . 6) - i386, noarch, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2015:0166-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0166.html Issue date: 2015-02-10 CVE Names: CVE-2014-3528 CVE-2014-3580 CVE-2014-8108 ===================================================================== 1. Summary: Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled REPORT requests. A remote, unauthenticated attacker could use a specially crafted REPORT request to crash mod_dav_svn. (CVE-2014-3580) A NULL pointer dereference flaw was found in the way the mod_dav_svn module handled certain requests for URIs that trigger a lookup of a virtual transaction name. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash. A malicious server able to provide a realm that triggers an MD5 collision could possibly use this flaw to obtain the credentials for a different realm. (CVE-2014-3528) Red Hat would like to thank the Subversion project for reporting CVE-2014-3580 and CVE-2014-8108. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1125799 - CVE-2014-3528 subversion: credentials leak via MD5 collision 1174054 - CVE-2014-3580 subversion: NULL pointer dereference flaw in mod_dav_svn when handling REPORT requests 1174057 - CVE-2014-8108 subversion: NULL pointer dereference flaw in mod_dav_svn when handling URIs for virtual transaction names 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: subversion-1.7.14-7.el7_0.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm subversion-1.7.14-7.el7_0.i686.rpm subversion-1.7.14-7.el7_0.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-devel-1.7.14-7.el7_0.i686.rpm subversion-devel-1.7.14-7.el7_0.x86_64.rpm subversion-gnome-1.7.14-7.el7_0.i686.rpm subversion-gnome-1.7.14-7.el7_0.x86_64.rpm subversion-javahl-1.7.14-7.el7_0.i686.rpm subversion-javahl-1.7.14-7.el7_0.x86_64.rpm subversion-kde-1.7.14-7.el7_0.i686.rpm subversion-kde-1.7.14-7.el7_0.x86_64.rpm subversion-libs-1.7.14-7.el7_0.i686.rpm subversion-libs-1.7.14-7.el7_0.x86_64.rpm subversion-perl-1.7.14-7.el7_0.i686.rpm subversion-perl-1.7.14-7.el7_0.x86_64.rpm subversion-python-1.7.14-7.el7_0.x86_64.rpm subversion-ruby-1.7.14-7.el7_0.i686.rpm subversion-ruby-1.7.14-7.el7_0.x86_64.rpm subversion-tools-1.7.14-7.el7_0.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: subversion-1.7.14-7.el7_0.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm subversion-1.7.14-7.el7_0.i686.rpm subversion-1.7.14-7.el7_0.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-devel-1.7.14-7.el7_0.i686.rpm subversion-devel-1.7.14-7.el7_0.x86_64.rpm subversion-gnome-1.7.14-7.el7_0.i686.rpm subversion-gnome-1.7.14-7.el7_0.x86_64.rpm subversion-javahl-1.7.14-7.el7_0.i686.rpm subversion-javahl-1.7.14-7.el7_0.x86_64.rpm subversion-kde-1.7.14-7.el7_0.i686.rpm subversion-kde-1.7.14-7.el7_0.x86_64.rpm subversion-libs-1.7.14-7.el7_0.i686.rpm subversion-libs-1.7.14-7.el7_0.x86_64.rpm subversion-perl-1.7.14-7.el7_0.i686.rpm subversion-perl-1.7.14-7.el7_0.x86_64.rpm subversion-python-1.7.14-7.el7_0.x86_64.rpm subversion-ruby-1.7.14-7.el7_0.i686.rpm subversion-ruby-1.7.14-7.el7_0.x86_64.rpm subversion-tools-1.7.14-7.el7_0.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: subversion-1.7.14-7.el7_0.src.rpm ppc64: mod_dav_svn-1.7.14-7.el7_0.ppc64.rpm subversion-1.7.14-7.el7_0.ppc64.rpm subversion-debuginfo-1.7.14-7.el7_0.ppc.rpm subversion-debuginfo-1.7.14-7.el7_0.ppc64.rpm subversion-libs-1.7.14-7.el7_0.ppc.rpm subversion-libs-1.7.14-7.el7_0.ppc64.rpm s390x: mod_dav_svn-1.7.14-7.el7_0.s390x.rpm subversion-1.7.14-7.el7_0.s390x.rpm subversion-debuginfo-1.7.14-7.el7_0.s390.rpm subversion-debuginfo-1.7.14-7.el7_0.s390x.rpm subversion-libs-1.7.14-7.el7_0.s390.rpm subversion-libs-1.7.14-7.el7_0.s390x.rpm x86_64: mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm subversion-1.7.14-7.el7_0.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-libs-1.7.14-7.el7_0.i686.rpm subversion-libs-1.7.14-7.el7_0.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: subversion-1.7.14-7.el7_0.ppc.rpm subversion-debuginfo-1.7.14-7.el7_0.ppc.rpm subversion-debuginfo-1.7.14-7.el7_0.ppc64.rpm subversion-devel-1.7.14-7.el7_0.ppc.rpm subversion-devel-1.7.14-7.el7_0.ppc64.rpm subversion-gnome-1.7.14-7.el7_0.ppc.rpm subversion-gnome-1.7.14-7.el7_0.ppc64.rpm subversion-javahl-1.7.14-7.el7_0.ppc.rpm subversion-javahl-1.7.14-7.el7_0.ppc64.rpm subversion-kde-1.7.14-7.el7_0.ppc.rpm subversion-kde-1.7.14-7.el7_0.ppc64.rpm subversion-perl-1.7.14-7.el7_0.ppc.rpm subversion-perl-1.7.14-7.el7_0.ppc64.rpm subversion-python-1.7.14-7.el7_0.ppc64.rpm subversion-ruby-1.7.14-7.el7_0.ppc.rpm subversion-ruby-1.7.14-7.el7_0.ppc64.rpm subversion-tools-1.7.14-7.el7_0.ppc64.rpm s390x: subversion-1.7.14-7.el7_0.s390.rpm subversion-debuginfo-1.7.14-7.el7_0.s390.rpm subversion-debuginfo-1.7.14-7.el7_0.s390x.rpm subversion-devel-1.7.14-7.el7_0.s390.rpm subversion-devel-1.7.14-7.el7_0.s390x.rpm subversion-gnome-1.7.14-7.el7_0.s390.rpm subversion-gnome-1.7.14-7.el7_0.s390x.rpm subversion-javahl-1.7.14-7.el7_0.s390.rpm subversion-javahl-1.7.14-7.el7_0.s390x.rpm subversion-kde-1.7.14-7.el7_0.s390.rpm subversion-kde-1.7.14-7.el7_0.s390x.rpm subversion-perl-1.7.14-7.el7_0.s390.rpm subversion-perl-1.7.14-7.el7_0.s390x.rpm subversion-python-1.7.14-7.el7_0.s390x.rpm subversion-ruby-1.7.14-7.el7_0.s390.rpm subversion-ruby-1.7.14-7.el7_0.s390x.rpm subversion-tools-1.7.14-7.el7_0.s390x.rpm x86_64: subversion-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-devel-1.7.14-7.el7_0.i686.rpm subversion-devel-1.7.14-7.el7_0.x86_64.rpm subversion-gnome-1.7.14-7.el7_0.i686.rpm subversion-gnome-1.7.14-7.el7_0.x86_64.rpm subversion-javahl-1.7.14-7.el7_0.i686.rpm subversion-javahl-1.7.14-7.el7_0.x86_64.rpm subversion-kde-1.7.14-7.el7_0.i686.rpm subversion-kde-1.7.14-7.el7_0.x86_64.rpm subversion-perl-1.7.14-7.el7_0.i686.rpm subversion-perl-1.7.14-7.el7_0.x86_64.rpm subversion-python-1.7.14-7.el7_0.x86_64.rpm subversion-ruby-1.7.14-7.el7_0.i686.rpm subversion-ruby-1.7.14-7.el7_0.x86_64.rpm subversion-tools-1.7.14-7.el7_0.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: subversion-1.7.14-7.el7_0.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_0.x86_64.rpm subversion-1.7.14-7.el7_0.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-libs-1.7.14-7.el7_0.i686.rpm subversion-libs-1.7.14-7.el7_0.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: subversion-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.i686.rpm subversion-debuginfo-1.7.14-7.el7_0.x86_64.rpm subversion-devel-1.7.14-7.el7_0.i686.rpm subversion-devel-1.7.14-7.el7_0.x86_64.rpm subversion-gnome-1.7.14-7.el7_0.i686.rpm subversion-gnome-1.7.14-7.el7_0.x86_64.rpm subversion-javahl-1.7.14-7.el7_0.i686.rpm subversion-javahl-1.7.14-7.el7_0.x86_64.rpm subversion-kde-1.7.14-7.el7_0.i686.rpm subversion-kde-1.7.14-7.el7_0.x86_64.rpm subversion-perl-1.7.14-7.el7_0.i686.rpm subversion-perl-1.7.14-7.el7_0.x86_64.rpm subversion-python-1.7.14-7.el7_0.x86_64.rpm subversion-ruby-1.7.14-7.el7_0.i686.rpm subversion-ruby-1.7.14-7.el7_0.x86_64.rpm subversion-tools-1.7.14-7.el7_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-3528 https://access.redhat.com/security/cve/CVE-2014-3580 https://access.redhat.com/security/cve/CVE-2014-8108 https://access.redhat.com/security/updates/classification/#moderate https://subversion.apache.org/security/CVE-2014-3528-advisory.txt https://subversion.apache.org/security/CVE-2014-3580-advisory.txt https://subversion.apache.org/security/CVE-2014-8108-advisory.txt 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFU2pCEXlSAg2UNWIIRAmlpAJ4o2MhM6glIBctGbU52rfN8EZXCDgCdEIll KM6EsnQkXd09uLTe1k+tQaU= =CuZg -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . These issues were addressed by updating Apache Subversion to version 1.7.19. CVE-ID CVE-2014-3522 CVE-2014-3528 CVE-2014-3580 CVE-2014-8108 Git Available for: OS X Mavericks v10.9.4 or later Impact: Synching with a malicious git repository may allow unexpected files to be added to the .git folder Description: The checks involved in disallowed paths did not account for case insensitivity or unicode characters. This issue was addressed by adding additional checks. CVE-ID CVE-2014-9390 : Matt Mackall of Mercurial and Augie Fackler of Mercurial Xcode 6.2 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "6.2"

Trust: 1.98

sources: NVD: CVE-2014-3528 // BID: 68995 // VULHUB: VHN-71468 // VULMON: CVE-2014-3528 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130349 // PACKETSTORM: 130344 // PACKETSTORM: 130744 // PACKETSTORM: 128073

AFFECTED PRODUCTS

vendor:apachemodel:subversionscope:eqversion:1.7.5

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.4

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.3

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.8.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.11

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.10

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.9

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.15

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.14

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.13

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.12

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.6

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.2.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.16

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.9

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.13

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.4

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.4

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.3.0

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:xcodescope:eqversion:6.1.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.6.z

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.23

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.3.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.9

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.12

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.8.8

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.6

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.5

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.8

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.15

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.1.4

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.8

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.8.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.1.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.8.7

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.18

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.7

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.6

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.11

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.6

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.2.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.4

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.1

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.16

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.14

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.10

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.5

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.17

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.8

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.5

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.20

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.1.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.1.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.3.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.19

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.5.7

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.1.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.2.2

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.0.7

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.8.9

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.5

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.2.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.21

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.4

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.17

Trust: 1.0

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.5

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.8

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.7

Trust: 0.3

vendor:applemodel:xcodescope:neversion:6.2

Trust: 0.3

sources: BID: 68995 // CNNVD: CNNVD-201408-080 // NVD: CVE-2014-3528

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3528
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-201408-080
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71468
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-3528
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3528
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-71468
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71468 // VULMON: CVE-2014-3528 // CNNVD: CNNVD-201408-080 // NVD: CVE-2014-3528

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.1

sources: VULHUB: VHN-71468 // NVD: CVE-2014-3528

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 130349 // PACKETSTORM: 130344 // CNNVD: CNNVD-201408-080

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201408-080

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-71468

PATCH

title:Red Hat: Moderate: subversion security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20150165 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: subversion security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20150166 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: subversion vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2316-1

Trust: 0.1

title:Apple: Xcode 6.2url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=28f88d65a83ee45368f37221b1b4ea8f

Trust: 0.1

title:Red Hat: CVE-2014-3528url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3528

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=92308e3c4d305e91c2eba8c9c6835e83

Trust: 0.1

sources: VULMON: CVE-2014-3528

EXTERNAL IDS

db:NVDid:CVE-2014-3528

Trust: 2.8

db:BIDid:68995

Trust: 2.1

db:SECUNIAid:60722

Trust: 1.8

db:SECUNIAid:59432

Trust: 1.8

db:SECUNIAid:59584

Trust: 1.2

db:CNNVDid:CNNVD-201408-080

Trust: 0.7

db:PACKETSTORMid:130344

Trust: 0.2

db:PACKETSTORMid:128073

Trust: 0.2

db:PACKETSTORMid:130349

Trust: 0.2

db:VULHUBid:VHN-71468

Trust: 0.1

db:VULMONid:CVE-2014-3528

Trust: 0.1

db:PACKETSTORMid:131094

Trust: 0.1

db:PACKETSTORMid:127874

Trust: 0.1

db:PACKETSTORMid:139060

Trust: 0.1

db:PACKETSTORMid:130744

Trust: 0.1

sources: VULHUB: VHN-71468 // VULMON: CVE-2014-3528 // BID: 68995 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130349 // PACKETSTORM: 130344 // PACKETSTORM: 130744 // PACKETSTORM: 128073 // CNNVD: CNNVD-201408-080 // NVD: CVE-2014-3528

REFERENCES

url:http://subversion.apache.org/security/cve-2014-3528-advisory.txt

Trust: 2.0

url:http://www.securityfocus.com/bid/68995

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-2316-1

Trust: 1.9

url:http://secunia.com/advisories/59432

Trust: 1.8

url:http://secunia.com/advisories/60722

Trust: 1.8

url:https://security.gentoo.org/glsa/201610-05

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-0165.html

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-0166.html

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00003.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 1.2

url:https://support.apple.com/ht204427

Trust: 1.2

url:http://secunia.com/advisories/59584

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-3528

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2014-3522

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2014-3528

Trust: 0.3

url:http://subversion.apache.org/

Trust: 0.3

url:http://seclists.org/oss-sec/2014/q3/273

Trust: 0.3

url:https://support.apple.com/en-us/ht204427

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0032

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-3580

Trust: 0.3

url:http://www.mandriva.com/en/support/security/

Trust: 0.2

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3528

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2014-3580

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://subversion.apache.org/security/cve-2014-3580-advisory.txt

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-8108

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/255.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2015:0165

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2316-1/

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0339.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3522

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0545.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0032

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0105.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/subversion/1.8.8-1ubuntu3.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/subversion/1.6.17dfsg-3ubuntu3.4

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0251

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0202

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2167

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0248

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5259

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3522

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3528

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0032

Trust: 0.1

url:https://subversion.apache.org/security/cve-2014-8108-advisory.txt

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2014-8108

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9390

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht1222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0338.html

Trust: 0.1

sources: VULHUB: VHN-71468 // VULMON: CVE-2014-3528 // BID: 68995 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130349 // PACKETSTORM: 130344 // PACKETSTORM: 130744 // PACKETSTORM: 128073 // CNNVD: CNNVD-201408-080 // NVD: CVE-2014-3528

CREDITS

Bert Huijben

Trust: 0.9

sources: BID: 68995 // CNNVD: CNNVD-201408-080

SOURCES

db:VULHUBid:VHN-71468
db:VULMONid:CVE-2014-3528
db:BIDid:68995
db:PACKETSTORMid:131094
db:PACKETSTORMid:127874
db:PACKETSTORMid:139060
db:PACKETSTORMid:130349
db:PACKETSTORMid:130344
db:PACKETSTORMid:130744
db:PACKETSTORMid:128073
db:CNNVDid:CNNVD-201408-080
db:NVDid:CVE-2014-3528

LAST UPDATE DATE

2024-11-20T19:56:49.492000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71468date:2018-10-30T00:00:00
db:VULMONid:CVE-2014-3528date:2018-10-30T00:00:00
db:BIDid:68995date:2016-10-26T01:16:00
db:CNNVDid:CNNVD-201408-080date:2014-08-20T00:00:00
db:NVDid:CVE-2014-3528date:2018-10-30T16:27:34.687

SOURCES RELEASE DATE

db:VULHUBid:VHN-71468date:2014-08-19T00:00:00
db:VULMONid:CVE-2014-3528date:2014-08-19T00:00:00
db:BIDid:68995date:2014-08-01T00:00:00
db:PACKETSTORMid:131094date:2015-03-30T21:22:48
db:PACKETSTORMid:127874date:2014-08-14T22:50:50
db:PACKETSTORMid:139060date:2016-10-12T04:50:20
db:PACKETSTORMid:130349date:2015-02-11T01:52:08
db:PACKETSTORMid:130344date:2015-02-11T01:49:16
db:PACKETSTORMid:130744date:2015-03-10T16:22:37
db:PACKETSTORMid:128073date:2014-09-02T20:16:50
db:CNNVDid:CNNVD-201408-080date:2014-08-06T00:00:00
db:NVDid:CVE-2014-3528date:2014-08-19T18:55:02.687