ID

VAR-201408-0086


CVE

CVE-2014-3522


TITLE

Apache Subversion of Serf RA Vulnerability impersonating server in layer

Trust: 0.8

sources: JVNDB: JVNDB-2014-003864

DESCRIPTION

The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. Supplementary information : CWE Vulnerability type by CWE-297: Improper Validation of Certificate with Host Mismatch ( Improper validation of certificates due to host mismatch ) Has been identified. http://cwe.mitre.org/data/definitions/297.htmlA man-in-the-middle attack can impersonate a server through a crafted certificate. Apache Subversion is prone to an information disclosure vulnerability. This may allow the attacker to obtain or modify sensitive information. Information harvested may aid in further attacks. The system is compatible with the Concurrent Versions System (CVS). The vulnerability stems from the fact that the program does not correctly handle the Common Name ( CN) or a wildcard for the subjectAltName field. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:085 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : subversion Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated subversion packages fix security vulnerabilities: The mod_dav_svn module in Apache Subversion before 1.8.8, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via an OPTIONS request (CVE-2014-0032). Ben Reser discovered that Subversion did not correctly validate SSL certificates containing wildcards. Bert Huijben discovered that Subversion did not properly handle cached credentials. A malicious server could possibly use this issue to obtain credentials cached for a different server (CVE-2014-3528). A NULL pointer dereference flaw was found in the way mod_dav_svn handled REPORT requests. A remote, unauthenticated attacker could use a crafted REPORT request to crash mod_dav_svn (CVE-2014-3580). A NULL pointer dereference flaw was found in the way mod_dav_svn handled URIs for virtual transaction names. A remote, unauthenticated attacker could send a request for a virtual transaction name that does not exist, causing mod_dav_svn to crash (CVE-2014-8108). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3522 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528 http://advisories.mageia.org/MGASA-2014-0105.html http://advisories.mageia.org/MGASA-2014-0339.html http://advisories.mageia.org/MGASA-2014-0545.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 3c1e67f77228815883b105a8e62a10e0 mbs2/x86_64/apache-mod_dav_svn-1.8.11-1.mbs2.x86_64.rpm 35c5f1efb679c09bc48d917b94954713 mbs2/x86_64/lib64svn0-1.8.11-1.mbs2.x86_64.rpm 56722eb7ac7b08654d795a5981ebd210 mbs2/x86_64/lib64svnjavahl1-1.8.11-1.mbs2.x86_64.rpm e1479d1c61864767d56a147bb4ee9b7f mbs2/x86_64/perl-SVN-1.8.11-1.mbs2.x86_64.rpm 7c4d79f31b0559c22cc84f39a06f9da0 mbs2/x86_64/perl-svn-devel-1.8.11-1.mbs2.x86_64.rpm 14720ab01668a9d04b566d5102c09f68 mbs2/x86_64/python-svn-1.8.11-1.mbs2.x86_64.rpm 07db3a7142457efc1e0547fd40bbf03f mbs2/x86_64/python-svn-devel-1.8.11-1.mbs2.x86_64.rpm 8d0511abbed2c57f505183bf00c4ab0d mbs2/x86_64/ruby-svn-1.8.11-1.mbs2.x86_64.rpm 8d062f6dd429b87f2b1d432c92e9a84a mbs2/x86_64/ruby-svn-devel-1.8.11-1.mbs2.x86_64.rpm 31e14a18991a2383065a069d53d3cd4e mbs2/x86_64/subversion-1.8.11-1.mbs2.x86_64.rpm 1ce1c374c428409e8a6380d64b8706f8 mbs2/x86_64/subversion-devel-1.8.11-1.mbs2.x86_64.rpm 052411de41e785decc0bc130e2756eff mbs2/x86_64/subversion-doc-1.8.11-1.mbs2.x86_64.rpm 98c1473e3721e4c9a6996db448c6ff36 mbs2/x86_64/subversion-server-1.8.11-1.mbs2.x86_64.rpm 6ad3881116530af4d889bb6c142d70dc mbs2/x86_64/subversion-tools-1.8.11-1.mbs2.x86_64.rpm 3fb0c871a5771c8fe4c6475b5ac0406c mbs2/x86_64/svn-javahl-1.8.11-1.mbs2.x86_64.rpm 45e0624a89e4c79d4739cd4eb22d9a29 mbs2/SRPMS/subversion-1.8.11-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVFl6JmqjQ0CJFipgRAgkVAJ4xKUzteqhyYcBC4AuYoZ7Lv3oQZQCfROhl NaJSaZq4W6qIMwD8fhQF5Ls= =R/mF -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2316-1 August 14, 2014 subversion vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in Subversion. Software Description: - subversion: Advanced version control system Details: Lieven Govaerts discovered that the Subversion mod_dav_svn module incorrectly handled certain request methods when SVNListParentPath was enabled. This issue only affected Ubuntu 12.04 LTS. (CVE-2014-3528) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libsvn1 1.8.8-1ubuntu3.1 subversion 1.8.8-1ubuntu3.1 Ubuntu 12.04 LTS: libapache2-svn 1.6.17dfsg-3ubuntu3.4 libsvn1 1.6.17dfsg-3ubuntu3.4 subversion 1.6.17dfsg-3ubuntu3.4 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2316-1 CVE-2014-0032, CVE-2014-3522, CVE-2014-3528 Package Information: https://launchpad.net/ubuntu/+source/subversion/1.8.8-1ubuntu3.1 https://launchpad.net/ubuntu/+source/subversion/1.6.17dfsg-3ubuntu3.4 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Subversion, Serf: Multiple Vulnerabilities Date: October 11, 2016 Bugs: #500482, #518716, #519202, #545348, #556076, #567810, #581448, #586046 ID: 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Subversion and Serf, the worst of which could lead to execution of arbitrary code. Background ========== Subversion is a version control system intended to eventually replace CVS. Like CVS, it has an optional client-server architecture (where the server can be an Apache server running mod_svn, or an ssh program as in CVS's :ext: method). In addition to supporting the features found in CVS, Subversion also provides support for moving and copying files and directories. The serf library is a high performance C-based HTTP client library built upon the Apache Portable Runtime (APR) library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-vcs/subversion < 1.9.4 >= 1.9.4 *> 1.8.16 2 net-libs/serf < 1.3.7 >= 1.3.7 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Subversion users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4" All Serf users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7" References ========== [ 1 ] CVE-2014-0032 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032 [ 2 ] CVE-2014-3504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504 [ 3 ] CVE-2014-3522 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522 [ 4 ] CVE-2014-3528 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528 [ 5 ] CVE-2015-0202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202 [ 6 ] CVE-2015-0248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248 [ 7 ] CVE-2015-0251 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251 [ 8 ] CVE-2015-3184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184 [ 9 ] CVE-2015-3187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187 [ 10 ] CVE-2015-5259 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259 [ 11 ] CVE-2016-2167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167 [ 12 ] CVE-2016-2168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201610-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . CVE-ID CVE-2014-3522 CVE-2014-3528 CVE-2014-3580 CVE-2014-8108 Git Available for: OS X Mavericks v10.9.4 or later Impact: Synching with a malicious git repository may allow unexpected files to be added to the .git folder Description: The checks involved in disallowed paths did not account for case insensitivity or unicode characters. This issue was addressed by adding additional checks. CVE-ID CVE-2014-9390 : Matt Mackall of Mercurial and Augie Fackler of Mercurial Xcode 6.2 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "6.2"

Trust: 2.43

sources: NVD: CVE-2014-3522 // JVNDB: JVNDB-2014-003864 // BID: 69237 // VULHUB: VHN-71462 // VULMON: CVE-2014-3522 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130744

AFFECTED PRODUCTS

vendor:apachemodel:subversionscope:eqversion:1.8.9

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.17

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.9

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.7

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.6

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.4

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.7.2

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.8.7

Trust: 1.6

vendor:apachemodel:subversionscope:eqversion:1.8.0

Trust: 1.6

vendor:apachemodel:subversionscope:eqversion:1.8.8

Trust: 1.6

vendor:apachemodel:subversionscope:eqversion:1.8.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.11

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.10

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.23

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.21

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.20

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.19

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.18

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.14

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.13

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.12

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.11

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.10

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.15

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.14

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.13

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.12

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.9

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.17

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.16

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.15

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.0

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.5.0

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.4.0

Trust: 1.3

vendor:applemodel:xcodescope:eqversion:6.1.1

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.4.3

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:12.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.16

Trust: 1.0

vendor:apachemodel:subversionscope:ltversion:1.8.x

Trust: 0.8

vendor:applemodel:xcodescope:ltversion:(os x mavericks v10.9.4 or later )

Trust: 0.8

vendor:apachemodel:subversionscope:ltversion:1.4.0 from 1.7.x

Trust: 0.8

vendor:canonicalmodel:ubuntuscope:eqversion:12.04 lts

Trust: 0.8

vendor:canonicalmodel:ubuntuscope:eqversion:14.04 lts

Trust: 0.8

vendor:applemodel:xcodescope:eqversion:6.2

Trust: 0.8

vendor:apachemodel:subversionscope:eqversion:1.7.18

Trust: 0.8

vendor:apachemodel:subversionscope:eqversion:1.8.10

Trust: 0.8

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:12.04

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.5

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.8

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.7

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.6.22

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.3.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.9

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.8

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.7

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.6

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.37

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.36

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.35

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.34

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.33

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.31

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.30

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.29

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.28.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.28.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.28

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.27

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.26

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.25

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.24.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.24.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.24

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.23

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.22.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.22.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.22

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.21

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.20.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.20

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.19

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.18.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.18

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.17.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.17

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.16.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14.5

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14.4

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.13.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.13.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.13

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.12

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.11.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.10.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.10.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.4.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.3.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.3.0

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.2.3

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.2.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.2.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.1.4

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.1.3

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.1.2

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.1.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.1.0

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.5

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.4

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.3

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.0.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.9

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.8

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.7

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.6

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.35.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.33.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.32.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.19.1

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.16

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.15

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.14.3

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:0.10.0

Trust: 0.3

vendor:applemodel:xcodescope:neversion:6.2

Trust: 0.3

vendor:apachemodel:subversionscope:neversion:1.8.10

Trust: 0.3

vendor:apachemodel:subversionscope:neversion:1.7.18

Trust: 0.3

sources: BID: 69237 // JVNDB: JVNDB-2014-003864 // CNNVD: CNNVD-201408-233 // NVD: CVE-2014-3522

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3522
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3522
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201408-233
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71462
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-3522
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3522
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-71462
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71462 // VULMON: CVE-2014-3522 // JVNDB: JVNDB-2014-003864 // CNNVD: CNNVD-201408-233 // NVD: CVE-2014-3522

PROBLEMTYPE DATA

problemtype:CWE-297

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-71462 // JVNDB: JVNDB-2014-003864 // NVD: CVE-2014-3522

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 131094 // PACKETSTORM: 127874 // CNNVD: CNNVD-201408-233

TYPE

Design Error

Trust: 0.3

sources: BID: 69237

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-003864

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-71462

PATCH

title:CVE-2014-3522-advisoryurl:https://subversion.apache.org/security/CVE-2014-3522-advisory.txt

Trust: 0.8

title:APPLE-SA-2015-03-09-4 Xcode 6.2url:http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html

Trust: 0.8

title:HT204427url:https://support.apple.com/en-us/HT204427

Trust: 0.8

title:HT204427url:http://support.apple.com/ja-jp/HT204427

Trust: 0.8

title:Oracle Solaris Third Party Bulletin - October 2015url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 0.8

title:USN-2316-1url:http://www.ubuntu.com/usn/USN-2316-1/

Trust: 0.8

title:subversion-1.7.18url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51250

Trust: 0.6

title:subversion-1.7.18url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51249

Trust: 0.6

title:subversion-1.8.10url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51253

Trust: 0.6

title:subversion-1.7.18url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51248

Trust: 0.6

title:subversion-1.8.10url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51252

Trust: 0.6

title:subversion-1.8.10url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=51251

Trust: 0.6

title:Ubuntu Security Notice: subversion vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2316-1

Trust: 0.1

title:Apple: Xcode 6.2url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=28f88d65a83ee45368f37221b1b4ea8f

Trust: 0.1

title:Amazon Linux AMI: ALAS-2014-413url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2014-413

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=92308e3c4d305e91c2eba8c9c6835e83

Trust: 0.1

sources: VULMON: CVE-2014-3522 // JVNDB: JVNDB-2014-003864 // CNNVD: CNNVD-201408-233

EXTERNAL IDS

db:NVDid:CVE-2014-3522

Trust: 3.3

db:BIDid:69237

Trust: 2.1

db:SECUNIAid:60722

Trust: 1.8

db:SECUNIAid:59432

Trust: 1.8

db:SECUNIAid:60100

Trust: 1.8

db:XFid:95090

Trust: 1.4

db:SECUNIAid:59584

Trust: 1.2

db:OSVDBid:109996

Trust: 1.2

db:JVNid:JVNVU90171154

Trust: 0.8

db:JVNDBid:JVNDB-2014-003864

Trust: 0.8

db:CNNVDid:CNNVD-201408-233

Trust: 0.7

db:PACKETSTORMid:130744

Trust: 0.2

db:VULHUBid:VHN-71462

Trust: 0.1

db:VULMONid:CVE-2014-3522

Trust: 0.1

db:PACKETSTORMid:131094

Trust: 0.1

db:PACKETSTORMid:127874

Trust: 0.1

db:PACKETSTORMid:139060

Trust: 0.1

sources: VULHUB: VHN-71462 // VULMON: CVE-2014-3522 // BID: 69237 // JVNDB: JVNDB-2014-003864 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130744 // CNNVD: CNNVD-201408-233 // NVD: CVE-2014-3522

REFERENCES

url:http://secunia.com/advisories/60100

Trust: 2.4

url:http://www.securityfocus.com/bid/69237

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-2316-1

Trust: 1.9

url:https://subversion.apache.org/security/cve-2014-3522-advisory.txt

Trust: 1.8

url:http://secunia.com/advisories/59432

Trust: 1.8

url:http://secunia.com/advisories/60722

Trust: 1.8

url:http://xforce.iss.net/xforce/xfdb/95090

Trust: 1.4

url:https://security.gentoo.org/glsa/201610-05

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00003.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 1.2

url:https://support.apple.com/ht204427

Trust: 1.2

url:http://www.osvdb.org/109996

Trust: 1.2

url:http://secunia.com/advisories/59584

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/95311

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/95090

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3522

Trust: 0.9

url:http://jvn.jp/vu/jvnvu90171154/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3522

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-3522

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2014-3528

Trust: 0.4

url:http://subversion.apache.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1127063

Trust: 0.3

url:https://support.apple.com/en-us/ht204427

Trust: 0.3

url:http://www.ubuntu.com/usn/usn-2316-1/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2014-0032

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/297.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2316-1/

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0339.html

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0545.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0032

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0105.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3528

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/subversion/1.8.8-1ubuntu3.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/subversion/1.6.17dfsg-3ubuntu3.4

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5259

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0251

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0202

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0248

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2167

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0248

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5259

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3522

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3528

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3580

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9390

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht1222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-71462 // VULMON: CVE-2014-3522 // BID: 69237 // JVNDB: JVNDB-2014-003864 // PACKETSTORM: 131094 // PACKETSTORM: 127874 // PACKETSTORM: 139060 // PACKETSTORM: 130744 // CNNVD: CNNVD-201408-233 // NVD: CVE-2014-3522

CREDITS

Ben Reser

Trust: 0.3

sources: BID: 69237

SOURCES

db:VULHUBid:VHN-71462
db:VULMONid:CVE-2014-3522
db:BIDid:69237
db:JVNDBid:JVNDB-2014-003864
db:PACKETSTORMid:131094
db:PACKETSTORMid:127874
db:PACKETSTORMid:139060
db:PACKETSTORMid:130744
db:CNNVDid:CNNVD-201408-233
db:NVDid:CVE-2014-3522

LAST UPDATE DATE

2024-11-23T20:18:13.322000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71462date:2018-10-30T00:00:00
db:VULMONid:CVE-2014-3522date:2018-10-30T00:00:00
db:BIDid:69237date:2016-10-26T01:16:00
db:JVNDBid:JVNDB-2014-003864date:2015-10-30T00:00:00
db:CNNVDid:CNNVD-201408-233date:2014-08-20T00:00:00
db:NVDid:CVE-2014-3522date:2024-11-21T02:08:17.650

SOURCES RELEASE DATE

db:VULHUBid:VHN-71462date:2014-08-19T00:00:00
db:VULMONid:CVE-2014-3522date:2014-08-19T00:00:00
db:BIDid:69237date:2014-08-14T00:00:00
db:JVNDBid:JVNDB-2014-003864date:2014-08-21T00:00:00
db:PACKETSTORMid:131094date:2015-03-30T21:22:48
db:PACKETSTORMid:127874date:2014-08-14T22:50:50
db:PACKETSTORMid:139060date:2016-10-12T04:50:20
db:PACKETSTORMid:130744date:2015-03-10T16:22:37
db:CNNVDid:CNNVD-201408-233date:2014-08-15T00:00:00
db:NVDid:CVE-2014-3522date:2014-08-19T18:55:02.640