Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:08.601Z
Reserved: 2015-07-01T00:00:00
Link: CVE-2015-5259
No data.
Status : Deferred
Published: 2016-01-08T19:59:01.410
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-5259
OpenCVE Enrichment
No data.