{"id":"USN-3388-1","summary":"subversion vulnerabilities","details":"Joern Schneeweisz discovered that Subversion did not properly handle\nhost names in 'svn+ssh://' URLs. A remote attacker could use this\nto construct a subversion repository that when accessed could run\narbitrary code with the privileges of the user. (CVE-2017-9800)\n\nDaniel Shahaf and James McCoy discovered that Subversion did not\nproperly verify realms when using Cyrus SASL authentication. A\nremote attacker could use this to possibly bypass intended access\nrestrictions. This issue only affected Ubuntu 14.04 LTS and Ubuntu\n16.04 LTS. (CVE-2016-2167)\n\nFlorian Weimer discovered that Subversion clients did not properly\nrestrict XML entity expansion when accessing http(s):// URLs. A remote\nattacker could use this to cause a denial of service. This issue only\naffected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-8734)\n","modified":"2026-02-10T04:41:11Z","published":"2017-08-11T06:19:23Z","related":["UBUNTU-CVE-2016-2167","UBUNTU-CVE-2016-8734","UBUNTU-CVE-2017-9800"],"upstream":["CVE-2016-2167","CVE-2016-8734","CVE-2017-9800","UBUNTU-CVE-2016-2167","UBUNTU-CVE-2016-8734","UBUNTU-CVE-2017-9800"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3388-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2167"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-8734"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-9800"}],"affected":[{"package":{"name":"subversion","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/subversion@1.8.8-1ubuntu3.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.8-1ubuntu3.3"}]}],"versions":["1.7.9-1+nmu6ubuntu3","1.7.13-2ubuntu1","1.7.13-2ubuntu2","1.7.13-2ubuntu3","1.7.14-1ubuntu2","1.8.5-2ubuntu3","1.8.8-1ubuntu2","1.8.8-1ubuntu3","1.8.8-1ubuntu3.1","1.8.8-1ubuntu3.2"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache2-mod-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libapache2-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-dev","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-java","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-perl","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn-ruby1.8","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"libsvn1","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"python-subversion","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"ruby-svn","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"subversion","binary_version":"1.8.8-1ubuntu3.3"},{"binary_name":"subversion-tools","binary_version":"1.8.8-1ubuntu3.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-2167","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-8734","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-9800","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3388-1.json"}},{"package":{"name":"subversion","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/subversion@1.9.3-2ubuntu1.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.3-2ubuntu1.1"}]}],"versions":["1.8.13-1ubuntu3","1.9.2-3ubuntu1","1.9.2-3ubuntu2","1.9.3-1ubuntu1","1.9.3-2ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libapache2-mod-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libapache2-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-dev","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-java","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-perl","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn-ruby1.8","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"libsvn1","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"python-subversion","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"ruby-svn","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"subversion","binary_version":"1.9.3-2ubuntu1.1"},{"binary_name":"subversion-tools","binary_version":"1.9.3-2ubuntu1.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2016-2167","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-8734","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-9800","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3388-1.json"}}],"schema_version":"1.7.3"}