MEDIUM · 4.3

CVE-2013-1896

mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a ME...

Vulnerability Description

mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
ApacheHttp Server>= 2.2.0, < 2.2.25
RedhatJboss Enterprise Application Platform6.0.0
RedhatEnterprise Linux5.0
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus5.9
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Server Aus5.9
RedhatEnterprise Linux Workstation5.0
CanonicalUbuntu Linux10.04
OpensuseOpensuse11.4

References

FAQ

What is CVE-2013-1896?

CVE-2013-1896 is a vulnerability with a CVSS score of 4.3 (MEDIUM). mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a ME...

How severe is CVE-2013-1896?

CVE-2013-1896 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2013-1896?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Redhat Jboss Enterprise Application Platform, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.