Vulnerability CVE-2016-2167


Published: 2016-05-05

Description:
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
4.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Apache -> Subversion 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ@mail.gmail.com%3E
http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA@mail.gmail.com%3E
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
http://www.debian.org/security/2016/dsa-3561
http://www.securityfocus.com/bid/89417
http://www.securitytracker.com/id/1035706
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
https://security.gentoo.org/glsa/201610-05

Copyright 2024, cxsecurity.com

 

Back to Top