FreeBSD : svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack. (f8a913cc-1322-11e3-8ffa-20cf30e32f6d)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Subversion Project reports :

svnserve takes a --pid-file option which creates a file containing the
process id it is running as. It does not take steps to ensure that the
file it has been directed at is not a symlink. If the pid file is in a
directory writeable by unprivileged users, the destination could be
replaced by a symlink allowing for privilege escalation. svnserve does
not create a pid file by default.

All versions are only vulnerable when the --pid-file=ARG option is

See also :

Solution :

Update the affected packages.

Risk factor :

Low / CVSS Base Score : 3.3

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 69546 ()

Bugtraq ID:

CVE ID: CVE-2013-4277

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now