Your submission was sent successfully! Close

CVE-2016-2167

Published: 5 May 2016

The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.

From the Ubuntu security team

Daniel Shahaf and James McCoy discovered that Subversion did not properly verify realms when using Cyrus SASL authentication. A remote attacker could use this to possibly bypass intended access restrictions.

Priority

Low

CVSS 3 base score: 6.8

Status

Package Release Status
subversion
Launchpad, Ubuntu, Debian
artful Not vulnerable
(1.9.4-1ubuntu1)
precise
Released (1.6.17dfsg-3ubuntu3.7)
trusty Does not exist
(trusty was released [1.8.8-1ubuntu3.3])
upstream
Released (1.9.4-1)
wily Ignored
(reached end-of-life)
xenial
Released (1.9.3-2ubuntu1.1)
yakkety Not vulnerable
(1.9.4-1ubuntu1)
zesty Not vulnerable
(1.9.4-1ubuntu1)