fkie_cve-2015-0248
Vulnerability from fkie_nvd
Published
2015-04-08 18:59
Modified
2024-11-21 02:22
Severity ?
Summary
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlMailing List
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00008.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1633.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1742.html
secalert@redhat.comhttp://subversion.apache.org/security/CVE-2015-0248-advisory.txtVendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3231
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:192Broken Link
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/74260
secalert@redhat.comhttp://www.securitytracker.com/id/1033214
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2721-1
secalert@redhat.comhttps://security.gentoo.org/glsa/201610-05
secalert@redhat.comhttps://support.apple.com/HT205217Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1633.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1742.html
af854a3a-2127-422b-91ae-364da2661108http://subversion.apache.org/security/CVE-2015-0248-advisory.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3231
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:192Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/74260
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033214
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2721-1
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-05
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT205217Third Party Advisory
Impacted products
Vendor Product Version
apache subversion 1.6.0
apache subversion 1.6.1
apache subversion 1.6.2
apache subversion 1.6.3
apache subversion 1.6.4
apache subversion 1.6.5
apache subversion 1.6.6
apache subversion 1.6.7
apache subversion 1.6.8
apache subversion 1.6.9
apache subversion 1.6.10
apache subversion 1.6.11
apache subversion 1.6.12
apache subversion 1.6.13
apache subversion 1.6.14
apache subversion 1.6.15
apache subversion 1.6.16
apache subversion 1.6.17
apache subversion 1.6.18
apache subversion 1.6.19
apache subversion 1.6.20
apache subversion 1.6.21
apache subversion 1.6.23
apache subversion 1.7.0
apache subversion 1.7.1
apache subversion 1.7.2
apache subversion 1.7.3
apache subversion 1.7.4
apache subversion 1.7.5
apache subversion 1.7.6
apache subversion 1.7.7
apache subversion 1.7.8
apache subversion 1.7.9
apache subversion 1.7.10
apache subversion 1.7.11
apache subversion 1.7.12
apache subversion 1.7.13
apache subversion 1.7.14
apache subversion 1.7.15
apache subversion 1.7.16
apache subversion 1.7.17
apache subversion 1.7.18
apache subversion 1.7.19
apache subversion 1.8.0
apache subversion 1.8.1
apache subversion 1.8.2
apache subversion 1.8.3
apache subversion 1.8.4
apache subversion 1.8.5
apache subversion 1.8.6
apache subversion 1.8.7
apache subversion 1.8.8
apache subversion 1.8.9
apache subversion 1.8.10
apache subversion 1.8.11
opensuse opensuse 13.1
opensuse opensuse 13.2
apple xcode 7.0
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_hpc_node 6
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server_eus 6.7.z
redhat enterprise_linux_workstation 6.0
oracle solaris 11.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7344422F-F65A-4000-A9EF-8D323DA29011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFD93B-693D-46DC-9C39-FDECB3E619E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA856400-1B48-429A-94A0-173B7EEE1EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers."
    },
    {
      "lang": "es",
      "value": "Los servidores (1) mod_dav_svn yd (2) svnserve en Subversion 1.6.0 hasta 1.7.19 y 1.8.0 hasta 1.8.11 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y abortar) a trav\u00e9s de combinaciones de par\u00e1metros relacionadas con n\u00fameros de revisi\u00f3n evaluados din\u00e1micamente."
    }
  ],
  "id": "CVE-2015-0248",
  "lastModified": "2024-11-21T02:22:38.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-08T18:59:01.827",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2015/dsa-3231"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/74260"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1033214"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2721-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT205217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2721-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT205217"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.