• 公告ID (KylinSec-SA-2024-3889)

摘要:

On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.

All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.

Subversion is not affected on UNIX-like platforms.

安全等级: Low

公告ID: KylinSec-SA-2024-3889

发布日期: 2024年10月12日

关联CVE: CVE-2024-45720  

  • 详细介绍

1. 漏洞描述

   

On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.

All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.

Subversion is not affected on UNIX-like platforms.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-45720 KY3.4-5 subversion Unaffected
CVE-2024-45720 KY3.5.2 subversion Unaffected
CVE-2024-45720 V6 subversion Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3888 下一篇:KylinSec-SA-2024-3890