FKIE_CVE-2015-0248

Vulnerability from fkie_nvd - Published: 2015-04-08 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlMailing List
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2015-04/msg00008.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1633.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1742.html
secalert@redhat.comhttp://subversion.apache.org/security/CVE-2015-0248-advisory.txtVendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3231
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:192Broken Link
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/74260
secalert@redhat.comhttp://www.securitytracker.com/id/1033214
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2721-1
secalert@redhat.comhttps://security.gentoo.org/glsa/201610-05
secalert@redhat.comhttps://support.apple.com/HT205217Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1633.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1742.html
af854a3a-2127-422b-91ae-364da2661108http://subversion.apache.org/security/CVE-2015-0248-advisory.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3231
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:192Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/74260
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1033214
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2721-1
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201610-05
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT205217Third Party Advisory
Impacted products
Vendor Product Version
apache subversion 1.6.0
apache subversion 1.6.1
apache subversion 1.6.2
apache subversion 1.6.3
apache subversion 1.6.4
apache subversion 1.6.5
apache subversion 1.6.6
apache subversion 1.6.7
apache subversion 1.6.8
apache subversion 1.6.9
apache subversion 1.6.10
apache subversion 1.6.11
apache subversion 1.6.12
apache subversion 1.6.13
apache subversion 1.6.14
apache subversion 1.6.15
apache subversion 1.6.16
apache subversion 1.6.17
apache subversion 1.6.18
apache subversion 1.6.19
apache subversion 1.6.20
apache subversion 1.6.21
apache subversion 1.6.23
apache subversion 1.7.0
apache subversion 1.7.1
apache subversion 1.7.2
apache subversion 1.7.3
apache subversion 1.7.4
apache subversion 1.7.5
apache subversion 1.7.6
apache subversion 1.7.7
apache subversion 1.7.8
apache subversion 1.7.9
apache subversion 1.7.10
apache subversion 1.7.11
apache subversion 1.7.12
apache subversion 1.7.13
apache subversion 1.7.14
apache subversion 1.7.15
apache subversion 1.7.16
apache subversion 1.7.17
apache subversion 1.7.18
apache subversion 1.7.19
apache subversion 1.8.0
apache subversion 1.8.1
apache subversion 1.8.2
apache subversion 1.8.3
apache subversion 1.8.4
apache subversion 1.8.5
apache subversion 1.8.6
apache subversion 1.8.7
apache subversion 1.8.8
apache subversion 1.8.9
apache subversion 1.8.10
apache subversion 1.8.11
opensuse opensuse 13.1
opensuse opensuse 13.2
apple xcode 7.0
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_hpc_node 6
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server_eus 6.7.z
redhat enterprise_linux_workstation 6.0
oracle solaris 11.3

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F34F463-6350-4F48-B037-856DDBB1A4FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C813BA-B8F9-446B-A07F-B51F26815578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DF4080D-0D95-429E-88AA-1051A5520C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF50F098-A055-4B79-AC35-6BD6F32D70F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "540461D4-87F4-42AB-ADDC-C7A067FE2893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E676744-C623-4894-8764-43588E56D2FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "669735D1-1C14-4CD7-AA7C-AD2CA63A1979",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4C568FD-54BC-4506-AF60-BFE7CE14D0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F71F24-D909-49D9-8B4F-FA757FDF1C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "034D1C36-B73E-443E-A6B4-44CC6E7BC043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D373245-8384-45E4-BE2E-E0518BD7F84F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED44413-D313-4588-9A4B-25F79D0925A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C193EB08-BBC2-43A2-B11A-9C7E2098862D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "022A5BCE-A1DC-48E2-829D-AD9261562095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "155F83A1-A04A-48C0-A801-B38F129F310F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "302DC06D-5FB1-4EF9-B5E1-6407B88D65FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A15D05-29BA-4CCC-9348-A516E1E2C079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2004B474-9869-445D-957D-20EF254FB461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F91A5E0-0DD8-47DD-B52E-A15E8064945F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C34BE8D-6DFF-4E57-971C-8CCEF13E6500",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "3194C6CE-3E8A-4861-AED1-942824974AE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D102460-B5D5-46C4-8021-7C3510A5FCF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92265E60-7BBF-4E8E-A438-4132D8FD57BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "346DE008-472F-47E1-8B96-F968C7D0A003",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9BDB22-29E0-48A3-8765-FAC6A3442A35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63AB9E5-FD99-40A8-B24F-623BDDBCA427",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B873C1-E7D6-4E55-A5A7-85000B686071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "87D2E8DD-4225-476A-AF17-7621C9A28391",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D913E2-0FBD-4F6C-8A21-43A0681237BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B869CEB-7637-48C3-8A4C-171CFB766B97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "75CF5BC1-7071-48A3-86A9-C843485CAED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "200DB058-C9F0-4983-AF99-EBB8FC2E7875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "57697AAD-5264-4C05-89E4-0228DEF2E9DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "24295270-DCBF-4FF3-88F7-E9A30B6388E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "22E754F2-5D3D-437E-BB15-693D2EB58DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4232D2-1F70-4A06-BD11-A0DFE6CE0744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3256F8C-2CA8-43B5-96E5-794113FF531B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "593F15F7-E610-458B-B094-BF6AC53B719A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC0E7811-3B60-46E7-943C-E0E7ED00FB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A57A3347-6C48-4803-AB4E-A4BC0E6BFA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D26799-D038-470A-A468-58DBDB64A7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3769BD6-B104-4F74-B8C4-89398A8894FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9757DD5E-42A6-44B8-9692-49690F60C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7B5A014-D4EE-4244-AABA-0873492F7295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9F8C2A-A94E-4D99-839B-47AAE8754191",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D29A9E-DB23-4D86-B4A3-3C4F663416AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D86AEE89-9F8E-43A5-A888-F421B10DB2C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D335628F-EC07-43BE-9B29-3365A6F64D71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EF7D71-3AAF-4112-831A-3538C5B82594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "89835508-F72F-4D8A-8E4A-5CFAA5F90C24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7344422F-F65A-4000-A9EF-8D323DA29011",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDFD93B-693D-46DC-9C39-FDECB3E619E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA856400-1B48-429A-94A0-173B7EEE1EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers."
    },
    {
      "lang": "es",
      "value": "Los servidores (1) mod_dav_svn yd (2) svnserve en Subversion 1.6.0 hasta 1.7.19 y 1.8.0 hasta 1.8.11 permiten a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n y abortar) a trav\u00e9s de combinaciones de par\u00e1metros relacionadas con n\u00fameros de revisi\u00f3n evaluados din\u00e1micamente."
    }
  ],
  "id": "CVE-2015-0248",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-04-08T18:59:01.827",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2015/dsa-3231"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/74260"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1033214"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2721-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT205217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1633.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2015-1742.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://subversion.apache.org/security/CVE-2015-0248-advisory.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2015/dsa-3231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/74260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1033214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2721-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201610-05"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT205217"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…