This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Two programming errors were discovered in which path names handled by
CVS were not properly validated. In one case, the CVS client accepts
absolute path names from the server when determining which files to
update. In another case, the CVS server accepts relative path names
from the client when determining which files to transmit, including
those containing references to parent directories (`../').
These programming errors generally only have a security impact when
dealing with remote CVS repositories.
A malicious CVS server may cause a CVS client to overwrite arbitrary
files on the client's system.
A CVS client may request RCS files from a remote system other than
those in the repository specified by $CVSROOT. These RCS files need
not be part of any CVS repository themselves.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.0
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 36645 (freebsd_pkg_0792e7a78e3711d890d10020ed76ef5a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now