fkie_cve-2018-11782
Vulnerability from fkie_nvd
Published
2019-09-26 16:15
Modified
2024-11-21 03:44
Severity ?
Summary
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://subversion.apache.org/security/CVE-2018-11782-advisory.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://subversion.apache.org/security/CVE-2018-11782-advisory.txt | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | * | |
apache | subversion | 1.12.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "50DD0181-B9AA-42E5-813E-8912532052BB", "versionEndIncluding": "1.9.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "198D8E5E-4D92-43C4-8C30-C940255B4FB0", "versionEndIncluding": "1.10.4", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45E5978-D958-44EB-8434-63078915B03C", "versionEndIncluding": "1.11.1", "versionStartIncluding": "1.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:subversion:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C60BCD44-BA16-4A6F-9B4D-2BA89601C76F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion\u0027s svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server." }, { "lang": "es", "value": "En Apache Subversion versiones hasta 1.9.10, 1.10.4, 1.12.0 incluy\u00e9ndolas, el proceso del servidor svnserve de Subversion puede cerrarse cuando una petici\u00f3n de solo lectura bien formada produce una respuesta en particular. Esto puede conllevar a interrupciones para usuarios del servidor." } ], "id": "CVE-2018-11782", "lastModified": "2024-11-21T03:44:01.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-26T16:15:10.363", "references": [ { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://subversion.apache.org/security/CVE-2018-11782-advisory.txt" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.