{"id":"CVE-2016-2168","details":"The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.","modified":"2026-04-16T06:16:17.097143231Z","published":"2016-05-05T18:59:01.710Z","related":["SUSE-SU-2016:1249-1","SUSE-SU-2016:1511-1","SUSE-SU-2017:2200-1","openSUSE-SU-2024:10538-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/89320"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035707"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html"},{"type":"WEB","url":"http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3561"},{"type":"ADVISORY","url":"http://subversion.apache.org/security/CVE-2016-2168-advisory.txt"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-05"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/subversion","events":[{"introduced":"0"},{"last_affected":"3dec6a0529685631fa7a4975a59424f815f121cb"},{"introduced":"0"},{"last_affected":"d5c449a05c043ec247cb68cb2bbb891779eb8566"},{"introduced":"0"},{"last_affected":"6a714a24a489050364efe1db2bc9ec894bbce349"},{"introduced":"0"},{"last_affected":"3f582fc98d82c0f76f7b9e695c53942f99560d11"},{"introduced":"0"},{"last_affected":"e03e7ac2e5341db1dc6646ecbd5893fc72f7d5cd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.8.15"},{"introduced":"0"},{"last_affected":"1.9.0"},{"introduced":"0"},{"last_affected":"1.9.1"},{"introduced":"0"},{"last_affected":"1.9.2"},{"introduced":"0"},{"last_affected":"1.9.3"}]}}],"versions":["1.8.15","1.9.0","1.9.1","1.9.2","1.9.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2168.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}