7.5
CVSSv2

CVE-2004-0397

Published: 07/07/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 765
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow during the apr_time_t data conversion in Subversion 1.0.2 and previous versions allows remote malicious users to execute arbitrary code via a (1) DAV2 REPORT query or (2) get-dated-rev svn-protocol command.

Vulnerable Product Search on Vulmon Subscribe to Product

subversion subversion 1.0

subversion subversion 1.0.1

subversion subversion 1.0.2

Exploits

## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' require 'msf/core/exploit/http' class Metasploit3 < M ...
/* subversion-102 exploit by Gyan Chawdhary * exploits a stack overflow in the svn_time_from_cstring() function We build * a date format which is valid but at the same time exits after the sscanf * function, or else it branches into another function which segfaults at the * apr_pool_t *pool We overwrite our eip with a pointer to the main ...
## # $Id: svnserve_daterb 9971 2010-08-07 06:59:16Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' require ' ...