ID

VAR-201504-0064


CVE

CVE-2015-0248


TITLE

Subversion of mod_dav_svn and svnserve Service disruption at the server (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-002129

DESCRIPTION

The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers. Apache Subversion is prone to multiple denial-of-service vulnerabilities. An attacker may exploit these issues to crash the affected application, resulting in a denial-of-service condition. The system is compatible with the Concurrent Versions System (CVS). A security vulnerability exists in the mod_dav_svn and svnserve servers of Subversion versions 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11. For the stable distribution (wheezy), these problems have been fixed in version 1.6.17dfsg-4+deb7u9. For the upcoming stable distribution (jessie), these problems have been fixed in version 1.8.10-6. For the unstable distribution (sid), these problems have been fixed in version 1.8.10-6. The updated packages have been upgraded to the 1.7.20 and 1.8.13 versions where these security flaws has been fixed. The verification of md5 checksums and GPG signatures is performed automatically for you. 6) - i386, noarch, x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Subversion, Serf: Multiple Vulnerabilities Date: October 11, 2016 Bugs: #500482, #518716, #519202, #545348, #556076, #567810, #581448, #586046 ID: 201610-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Subversion and Serf, the worst of which could lead to execution of arbitrary code. Background ========== Subversion is a version control system intended to eventually replace CVS. Like CVS, it has an optional client-server architecture (where the server can be an Apache server running mod_svn, or an ssh program as in CVS's :ext: method). In addition to supporting the features found in CVS, Subversion also provides support for moving and copying files and directories. The serf library is a high performance C-based HTTP client library built upon the Apache Portable Runtime (APR) library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-vcs/subversion < 1.9.4 >= 1.9.4 *> 1.8.16 2 net-libs/serf < 1.3.7 >= 1.3.7 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Subversion and Serf. Please review the CVE identifiers referenced below for details Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, conduct a man-in-the-middle attack, obtain sensitive information, or cause a Denial of Service Condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Subversion users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4" All Serf users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7" References ========== [ 1 ] CVE-2014-0032 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032 [ 2 ] CVE-2014-3504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504 [ 3 ] CVE-2014-3522 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522 [ 4 ] CVE-2014-3528 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528 [ 5 ] CVE-2015-0202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202 [ 6 ] CVE-2015-0248 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248 [ 7 ] CVE-2015-0251 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251 [ 8 ] CVE-2015-3184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184 [ 9 ] CVE-2015-3187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187 [ 10 ] CVE-2015-5259 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259 [ 11 ] CVE-2016-2167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167 [ 12 ] CVE-2016-2168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201610-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-09-16-2 Xcode 7.0 Xcode 7.0 is now available and addresses the following: DevTools Available for: OS X Yosemite v10.10.4 or later Impact: An attacker may be able to bypass access restrictions Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version. CVE-ID CVE-2015-3185 : Branko Aibej of the Apache Software Foundation IDE Xcode Server Available for: OS X Yosemite 10.10 or later Impact: An attacker may be able to access restricted parts of the filesystem Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3. CVE-ID CVE-2014-6394 : Ilya Kantor IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilties in OpenSSL Description: Multiple vulnerabilties existed in the node.js OpenSSL module prior to version 1.0.1j. These issues were addressed by updating openssl to version 1.0.1j. CVE-ID CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic. CVE-ID CVE-2015-5910 : an anonymous researcher IDE Xcode Server Available for: OS X Yosemite v10.10.4 or later Impact: Build notifications may be sent to unintended recipients Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation. CVE-ID CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree subversion Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19 Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20. CVE-ID CVE-2015-0248 CVE-2015-0251 Xcode 7.0 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "7.0". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJV+axlAAoJEBcWfLTuOo7tzuMQAJhCQaeClT0rDozh+WlKgM6f X86xFeXLJ1gjlPKH183Bvm2gTW0m5kQuoNK1grarMB+rEeb8mPsOczwrIJisxVlr 5zkW/7JktHcsBU5vUa4j4T/CEJjp92VPZ4ub3k3eQOrhinn4E86uKcMxrYoQOAE0 YFMSDaPBFy+LIJ08ROB/AH8fkGJMLRCRAp43IGgzNuxCDx9jzW97m1dh86mR1CxP GdhWRvN7T5YqXyJTw6pZbEHtVXjty8appe2ScvHByCRxa4gZq+/JinHInLjaB4p7 3o58rAWh7lDhcEi3HqkIu0YW6fLslPydCHTI4cH1PCHTuevNjjvK34IqMbD0jG/t tO+vQFhwXpD5chsSB2oP2zLOWAJ7BA5uwvArkJhGKKzQ5DEI0soLBWG7Koe3RitO HokIMyx0r+sf4YD+OP4RVPU9bU4FpayXZnECmHzWmK2vguihbIzjxq+Knvx7aiF9 js1Qn0DxT2puVYdhixtkvYKT7r8XRjI8MPLEwS+tX1Yg1Lqhz2G1MR6mO9iBW56L g5deOuCVc56qeaobuUK0clvdFYtyd5jIXgh0zspZ4ssCbbdCOTZUQaG1mBGkIf3R JgWTX8ny1Fdk9om3dmZVWUCzzqxJR/tm5M7kjGc425ZGaoBRWLga1VIjNz7MEfKS YMBNmqt6weEewNqyDMnX =SGgX -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: subversion security update Advisory ID: RHSA-2015:1742-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1742.html Issue date: 2015-09-08 CVE Names: CVE-2015-0248 CVE-2015-0251 CVE-2015-3184 CVE-2015-3187 ===================================================================== 1. Summary: Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. The mod_dav_svn module is used with the Apache HTTP Server to allow access to Subversion repositories via HTTP. A remote attacker could use this flaw to cause the SVN server (both svnserve and httpd with the mod_dav_svn module) to crash. (CVE-2015-0248) It was found that the mod_authz_svn module did not properly restrict anonymous access to Subversion repositories under certain configurations when used with Apache httpd 2.4.x. This could allow a user to anonymously access files in a Subversion repository, which should only be accessible to authenticated users. (CVE-2015-3184) It was found that the mod_dav_svn module did not properly validate the svn:author property of certain requests. An attacker able to create new revisions could use this flaw to spoof the svn:author property. (CVE-2015-0251) It was found that when an SVN server (both svnserve and httpd with the mod_dav_svn module) searched the history of a file or a directory, it would disclose its location in the repository if that file or directory was not readable (for example, if it had been moved). (CVE-2015-3187) Red Hat would like to thank the Apache Software Foundation for reporting these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael Pilato of CollabNet as the original reporter of CVE-2015-3184 and CVE-2015-3187 flaws. All subversion users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.i686.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.i686.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm ppc64: mod_dav_svn-1.7.14-7.el7_1.1.ppc64.rpm subversion-1.7.14-7.el7_1.1.ppc64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm subversion-libs-1.7.14-7.el7_1.1.ppc.rpm subversion-libs-1.7.14-7.el7_1.1.ppc64.rpm s390x: mod_dav_svn-1.7.14-7.el7_1.1.s390x.rpm subversion-1.7.14-7.el7_1.1.s390x.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm subversion-libs-1.7.14-7.el7_1.1.s390.rpm subversion-libs-1.7.14-7.el7_1.1.s390x.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: subversion-1.7.14-7.ael7b_1.1.src.rpm ppc64le: mod_dav_svn-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-libs-1.7.14-7.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: subversion-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm subversion-devel-1.7.14-7.el7_1.1.ppc.rpm subversion-devel-1.7.14-7.el7_1.1.ppc64.rpm subversion-gnome-1.7.14-7.el7_1.1.ppc.rpm subversion-gnome-1.7.14-7.el7_1.1.ppc64.rpm subversion-javahl-1.7.14-7.el7_1.1.ppc.rpm subversion-javahl-1.7.14-7.el7_1.1.ppc64.rpm subversion-kde-1.7.14-7.el7_1.1.ppc.rpm subversion-kde-1.7.14-7.el7_1.1.ppc64.rpm subversion-perl-1.7.14-7.el7_1.1.ppc.rpm subversion-perl-1.7.14-7.el7_1.1.ppc64.rpm subversion-python-1.7.14-7.el7_1.1.ppc64.rpm subversion-ruby-1.7.14-7.el7_1.1.ppc.rpm subversion-ruby-1.7.14-7.el7_1.1.ppc64.rpm subversion-tools-1.7.14-7.el7_1.1.ppc64.rpm s390x: subversion-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm subversion-devel-1.7.14-7.el7_1.1.s390.rpm subversion-devel-1.7.14-7.el7_1.1.s390x.rpm subversion-gnome-1.7.14-7.el7_1.1.s390.rpm subversion-gnome-1.7.14-7.el7_1.1.s390x.rpm subversion-javahl-1.7.14-7.el7_1.1.s390.rpm subversion-javahl-1.7.14-7.el7_1.1.s390x.rpm subversion-kde-1.7.14-7.el7_1.1.s390.rpm subversion-kde-1.7.14-7.el7_1.1.s390x.rpm subversion-perl-1.7.14-7.el7_1.1.s390.rpm subversion-perl-1.7.14-7.el7_1.1.s390x.rpm subversion-python-1.7.14-7.el7_1.1.s390x.rpm subversion-ruby-1.7.14-7.el7_1.1.s390.rpm subversion-ruby-1.7.14-7.el7_1.1.s390x.rpm subversion-tools-1.7.14-7.el7_1.1.s390x.rpm x86_64: subversion-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-devel-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-gnome-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-javahl-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-kde-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-perl-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-python-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-ruby-1.7.14-7.ael7b_1.1.ppc64le.rpm subversion-tools-1.7.14-7.ael7b_1.1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: subversion-1.7.14-7.el7_1.1.src.rpm x86_64: mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm subversion-1.7.14-7.el7_1.1.x86_64.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-libs-1.7.14-7.el7_1.1.i686.rpm subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: subversion-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm subversion-devel-1.7.14-7.el7_1.1.i686.rpm subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm subversion-gnome-1.7.14-7.el7_1.1.i686.rpm subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm subversion-javahl-1.7.14-7.el7_1.1.i686.rpm subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm subversion-kde-1.7.14-7.el7_1.1.i686.rpm subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm subversion-perl-1.7.14-7.el7_1.1.i686.rpm subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm subversion-python-1.7.14-7.el7_1.1.x86_64.rpm subversion-ruby-1.7.14-7.el7_1.1.i686.rpm subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-0248 https://access.redhat.com/security/cve/CVE-2015-0251 https://access.redhat.com/security/cve/CVE-2015-3184 https://access.redhat.com/security/cve/CVE-2015-3187 https://access.redhat.com/security/updates/classification/#moderate https://subversion.apache.org/security/CVE-2015-0248-advisory.txt https://subversion.apache.org/security/CVE-2015-3184-advisory.txt https://subversion.apache.org/security/CVE-2015-0251-advisory.txt https://subversion.apache.org/security/CVE-2015-3187-advisory.txt 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV7t6+XlSAg2UNWIIRAivqAKCtV0lnW3RGFsCNsKIU9lBHeBk4UQCdE8/b KVJwbobNcmPzKule+9U7RnM= =F2J4 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.61

sources: NVD: CVE-2015-0248 // JVNDB: JVNDB-2015-002129 // BID: 74260 // VULHUB: VHN-78194 // VULMON: CVE-2015-0248 // PACKETSTORM: 131562 // PACKETSTORM: 131276 // PACKETSTORM: 133096 // PACKETSTORM: 139060 // PACKETSTORM: 133617 // PACKETSTORM: 133473

AFFECTED PRODUCTS

vendor:apachemodel:subversionscope:eqversion:1.6.14

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.13

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.12

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.11

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.10

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.17

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.16

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.15

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.1

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.6.0

Trust: 1.9

vendor:apachemodel:subversionscope:eqversion:1.8.11

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.10

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.9

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.19

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.18

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.17

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.16

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.11

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.10

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.1

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.23

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.21

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.20

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.19

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.18

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.8.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.9

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.6

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.5

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.4

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.3

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.2

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.15

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.14

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.13

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.7.12

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.9

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.8

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.7

Trust: 1.3

vendor:apachemodel:subversionscope:eqversion:1.6.4

Trust: 1.3

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:6.7.z

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.7.0

Trust: 1.0

vendor:applemodel:xcodescope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:11.3

Trust: 1.0

vendor:apachemodel:subversionscope:eqversion:1.6.0 to 1.7.19

Trust: 0.8

vendor:apachemodel:subversionscope:eqversion:1.8.0 to 1.8.11

Trust: 0.8

vendor:applemodel:xcodescope:ltversion:7.0 (os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:ubuntumodel:linuxscope:eqversion:15.04

Trust: 0.3

vendor:ubuntumodel:linux ltsscope:eqversion:14.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:7

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.5

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.8

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.7

Trust: 0.3

vendor:apachemodel:subversionscope:eqversion:1.6.22

Trust: 0.3

vendor:applemodel:xcodescope:neversion:7.0

Trust: 0.3

vendor:apachemodel:subversionscope:neversion:1.8.13

Trust: 0.3

vendor:apachemodel:subversionscope:neversion:1.7.20

Trust: 0.3

sources: BID: 74260 // JVNDB: JVNDB-2015-002129 // CNNVD: CNNVD-201504-099 // NVD: CVE-2015-0248

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0248
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-0248
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201504-099
value: MEDIUM

Trust: 0.6

VULHUB: VHN-78194
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-0248
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-0248
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-78194
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-78194 // VULMON: CVE-2015-0248 // JVNDB: JVNDB-2015-002129 // CNNVD: CNNVD-201504-099 // NVD: CVE-2015-0248

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-78194 // JVNDB: JVNDB-2015-002129 // NVD: CVE-2015-0248

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 133096 // PACKETSTORM: 133473 // CNNVD: CNNVD-201504-099

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201504-099

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002129

PATCH

title:APPLE-SA-2015-09-16-2 Xcode 7.0url:http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html

Trust: 0.8

title:HT205217url:https://support.apple.com/en-us/HT205217

Trust: 0.8

title:HT205217url:http://support.apple.com/ja-jp/HT205217

Trust: 0.8

title:Oracle Solaris Third Party Bulletin - October 2015url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 0.8

title:RHSA-2015:1633url:http://rhn.redhat.com/errata/RHSA-2015-1633.html

Trust: 0.8

title:CVE-2015-0248-advisoryurl:http://subversion.apache.org/security/CVE-2015-0248-advisory.txt

Trust: 0.8

title:subversion-1.7.20url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54876

Trust: 0.6

title:subversion-1.8.13url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54880

Trust: 0.6

title:subversion-1.8.13url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54879

Trust: 0.6

title:subversion-1.7.20url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54878

Trust: 0.6

title:subversion-1.7.20url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54877

Trust: 0.6

title:subversion-1.8.13url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54881

Trust: 0.6

title:Debian Security Advisories: DSA-3231-1 subversion -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9dd5c0c7b53a0f19f49a9b42677637fd

Trust: 0.1

title:Red Hat: CVE-2015-0248url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-0248

Trust: 0.1

title:Amazon Linux AMI: ALAS-2015-587url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2015-587

Trust: 0.1

title:Apple: Xcode 7.0url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=768a45894d5a25fbf47fbec8f017a52b

Trust: 0.1

title:Ubuntu Security Notice: subversion vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2721-1

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=92308e3c4d305e91c2eba8c9c6835e83

Trust: 0.1

sources: VULMON: CVE-2015-0248 // JVNDB: JVNDB-2015-002129 // CNNVD: CNNVD-201504-099

EXTERNAL IDS

db:NVDid:CVE-2015-0248

Trust: 3.5

db:BIDid:74260

Trust: 1.5

db:SECTRACKid:1033214

Trust: 1.2

db:JVNid:JVNVU99970459

Trust: 0.8

db:JVNDBid:JVNDB-2015-002129

Trust: 0.8

db:CNNVDid:CNNVD-201504-099

Trust: 0.7

db:ICS CERTid:ICSA-22-123-01

Trust: 0.6

db:CS-HELPid:SB2022050403

Trust: 0.6

db:PACKETSTORMid:133473

Trust: 0.2

db:PACKETSTORMid:131562

Trust: 0.2

db:PACKETSTORMid:133096

Trust: 0.2

db:VULHUBid:VHN-78194

Trust: 0.1

db:VULMONid:CVE-2015-0248

Trust: 0.1

db:PACKETSTORMid:131276

Trust: 0.1

db:PACKETSTORMid:139060

Trust: 0.1

db:PACKETSTORMid:133617

Trust: 0.1

sources: VULHUB: VHN-78194 // VULMON: CVE-2015-0248 // BID: 74260 // JVNDB: JVNDB-2015-002129 // PACKETSTORM: 131562 // PACKETSTORM: 131276 // PACKETSTORM: 133096 // PACKETSTORM: 139060 // PACKETSTORM: 133617 // PACKETSTORM: 133473 // CNNVD: CNNVD-201504-099 // NVD: CVE-2015-0248

REFERENCES

url:http://subversion.apache.org/security/cve-2015-0248-advisory.txt

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2015-1742.html

Trust: 1.6

url:http://www.securityfocus.com/bid/74260

Trust: 1.3

url:https://security.gentoo.org/glsa/201610-05

Trust: 1.3

url:http://rhn.redhat.com/errata/rhsa-2015-1633.html

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/sep/msg00002.html

Trust: 1.2

url:http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html

Trust: 1.2

url:https://support.apple.com/ht205217

Trust: 1.2

url:http://www.debian.org/security/2015/dsa-3231

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2015:192

Trust: 1.2

url:http://www.securitytracker.com/id/1033214

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-2721-1

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0248

Trust: 0.9

url:http://jvn.jp/vu/jvnvu99970459/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0248

Trust: 0.8

url:http://www.mandriva.com/en/support/security/advisories/advisory/mdvsa-2015:192/?name=mdvsa-2015:192

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-0248

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-0251

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022050403

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-123-01

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2015-0248

Trust: 0.3

url:http://subversion.apache.org/

Trust: 0.3

url:http://subversion.apache.org/security/cve-2015-0251-advisory.txt

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3187

Trust: 0.3

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-0202

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-0251

Trust: 0.2

url:https://subversion.apache.org/security/cve-2015-3187-advisory.txt

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2015-3187

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3184

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.debian.org/security/./dsa-3231

Trust: 0.1

url:https://usn.ubuntu.com/2721-1/

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://subversion.apache.org/security/cve-2015-0202-advisory.txt

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0202

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3187

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5259

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3528

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2168

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2167

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2167

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0248

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-3184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3522

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5259

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0251

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-0202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3522

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3528

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3185

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6394

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5909

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3566

Trust: 0.1

url:https://subversion.apache.org/security/cve-2015-3184-advisory.txt

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-3184

Trust: 0.1

sources: VULHUB: VHN-78194 // VULMON: CVE-2015-0248 // BID: 74260 // JVNDB: JVNDB-2015-002129 // PACKETSTORM: 131562 // PACKETSTORM: 131276 // PACKETSTORM: 133096 // PACKETSTORM: 139060 // PACKETSTORM: 133617 // PACKETSTORM: 133473 // CNNVD: CNNVD-201504-099 // NVD: CVE-2015-0248

CREDITS

JPCERT/CC notified CISA of these vulnerabilities.

Trust: 0.6

sources: CNNVD: CNNVD-201504-099

SOURCES

db:VULHUBid:VHN-78194
db:VULMONid:CVE-2015-0248
db:BIDid:74260
db:JVNDBid:JVNDB-2015-002129
db:PACKETSTORMid:131562
db:PACKETSTORMid:131276
db:PACKETSTORMid:133096
db:PACKETSTORMid:139060
db:PACKETSTORMid:133617
db:PACKETSTORMid:133473
db:CNNVDid:CNNVD-201504-099
db:NVDid:CVE-2015-0248

LAST UPDATE DATE

2024-11-23T20:22:49.609000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-78194date:2018-10-30T00:00:00
db:VULMONid:CVE-2015-0248date:2018-10-30T00:00:00
db:BIDid:74260date:2016-10-26T01:16:00
db:JVNDBid:JVNDB-2015-002129date:2015-10-30T00:00:00
db:CNNVDid:CNNVD-201504-099date:2022-05-05T00:00:00
db:NVDid:CVE-2015-0248date:2024-11-21T02:22:38.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-78194date:2015-04-08T00:00:00
db:VULMONid:CVE-2015-0248date:2015-04-08T00:00:00
db:BIDid:74260date:2015-04-13T00:00:00
db:JVNDBid:JVNDB-2015-002129date:2015-04-10T00:00:00
db:PACKETSTORMid:131562date:2015-04-22T00:38:50
db:PACKETSTORMid:131276date:2015-04-03T15:47:42
db:PACKETSTORMid:133096date:2015-08-17T15:40:41
db:PACKETSTORMid:139060date:2016-10-12T04:50:20
db:PACKETSTORMid:133617date:2015-09-19T15:31:48
db:PACKETSTORMid:133473date:2015-09-08T15:47:21
db:CNNVDid:CNNVD-201504-099date:2015-04-09T00:00:00
db:NVDid:CVE-2015-0248date:2015-04-08T18:59:01.827