1 Subversion versions up to and including 1.0.2 have a buffer overflow in
4 Both client and server are vulnerable. The server is vulnerable over
5 both httpd/DAV and svnserve (that is, over http://, https://, svn://,
6 svn+ssh:// and other tunneled svn+*:// methods).
8 Additionally, clients with shared working copies, or permissions that
9 allow files in the administrative area of the working copy to be
10 written by other users, are potentially exploitable.
15 Severity ranges from "Denial of Service" to, potentially, "Arbitrary
16 Code Execution", depending upon how skilled the attacker is and the
17 ABI specifics of your platform.
19 The server vulnerabilities can be triggered without write/commit access
20 to the repository. So repositories with anonymous/public read access
26 There are no workarounds except to disallow public access. Even then
27 you'd still be vulnerable to attack by someone who still has access
28 (perhaps you trust those people, though).
33 We recommend all users upgrade to 1.0.3.
38 CAN-2004-0397: subversion sscanf stack overflow via revision date
44 There was a similar vulnerability in the Neon HTTP library up to and including
45 version 0.24.5. Because Subversion ships with Neon, we have included (in
46 Subversion 1.0.3) Neon 0.24.6, which is being released simultaneously.
47 Subversion does not actually invoke the vulnerable code in Neon; we are
48 updating our copy of Neon simply as a reassuring gesture, so people don't
49 worry. See CAN-2004-0398 for details.