Secunia Security Advisory - A vulnerability has been reported in Subversion, which can be exploited by malicious people to compromise a user's system.
e51366d4fcb05d02a0f580a453f8bf2abcc9676d65165a27136fdb0ca06de321
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Subversion Client Directory Traversal Vulnerability
SECUNIA ADVISORY ID:
SA26625
VERIFY ADVISORY:
http://secunia.com/advisories/26625/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Subversion 1.x
http://secunia.com/product/3376/
DESCRIPTION:
A vulnerability has been reported in Subversion, which can be
exploited by malicious people to compromise a user's system.
The vulnerability is caused due to the Subversion client not
correctly sanitising the name of files during a checkout or update.
This can be exploited to create arbitrary files outside the working
directory on a client system by setting up a malicious repository or
committing a malicious file (requires commit access) containing
directory traversal sequences ("..\") in the file name and tricking a
user into checking out or updating the repository.
Successful exploitation requires that the client runs on a system
that handles "\" as separator for directories (e.g. Windows).
The vulnerability is reported in version 1.4.4 and prior.
SOLUTION:
Update to version 1.4.5.
PROVIDED AND/OR DISCOVERED BY:
Nils Durner and Christian Grothoff, Colorado Research Institute for
Security and Privacy
ORIGINAL ADVISORY:
http://subversion.tigris.org/servlets/NewsItemView?newsItemID=1941
http://subversion.tigris.org/servlets/ReadMsg?list=users&msgNo=69413
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------