Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5259

Опубликовано: 15 дек. 2015
Источник: redhat
CVSS2: 7.5

Описание

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5subversionNot affected
Red Hat Enterprise Linux 6subversionNot affected
Red Hat Enterprise Linux 7subversionNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-190->CWE-122
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1289958subversion: integer overflow in the svn:// protocol parser

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 10 лет назад

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

CVSS3: 8.6
nvd
около 10 лет назад

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

CVSS3: 8.6
debian
около 10 лет назад

Integer overflow in the read_string function in libsvn_ra_svn/marshal. ...

CVSS3: 8.6
github
больше 3 лет назад

Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.

7.5 High

CVSS2