Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:SVN-DATE-OF

Severity

High

Recommended

No

Category

APP

Keywords

Subversion Date Parsing Function Buffer Overflow

Release Date

2008/01/04

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Subversion Date Parsing Function Buffer Overflow


This signature detects attempts to exploit a known vulnerability against SVN SubVersion server. Versions 1.0.0 and 0.37 are vulnerable. A successful attack allows the attacker to execute arbitrary code within the context of the server.

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

  • Gentoo Linux 1.4.0
  • Subversion 1.0.0
  • Subversion 1.0.1
  • Subversion 1.0.2

References

  • BugTraq: 10386
  • CVE: CVE-2004-0397
  • URL: http://www.milw0rm.com/exploits/4537

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out