FreeBSD : subversion -- multiple vulnerabilities (c8174b63-0d3a-11e6-b06e-d43d7eed0ce2)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Subversion project reports :

svnserve, the svn:// protocol server, can optionally use the Cyrus
SASL library for authentication, integrity protection, and encryption.
Due to a programming oversight, authentication against Cyrus SASL
would permit the remote user to specify a realm string which is a
prefix of the expected realm string.

Subversion's httpd servers are vulnerable to a remotely triggerable
crash in the mod_authz_svn module. The crash can occur during an
authorization check for a COPY or MOVE request with a specially
crafted header value.

This allows remote attackers to cause a denial of service.

See also :

http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
http://www.nessus.org/u?0b32136e

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 90780 ()

Bugtraq ID:

CVE ID: CVE-2016-2167
CVE-2016-2168

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now