Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:MISC:APACHE-SVN-IO

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

APP

Keywords

Apache Subversion SVN Protocol Parser Integer Overflow

Release Date

2016/01/19

Update Number

2621

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Apache Subversion SVN Protocol Parser Integer Overflow


This signature detects attempts to exploit a known vulnerability in Apache Subversion SVN Protocol Parser. Successful exploitation could allow the attacker to cause a denial-ofservice or execute arbitrary code.

Extended Description

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

Affected Products

  • Apache subversion 1.9.0
  • Apache subversion 1.9.1
  • Apache subversion 1.9.2

References

  • CVE: CVE-2015-5259
  • URL: https://subversion.apache.org/security/cve-2015-5259-advisory.txt

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out