FreeBSD : subversion -- several vulnerabilities (83a418cc-2182-11e4-802c-20cf30e32f6d)

medium Nessus Plugin ID 77125


The remote FreeBSD host is missing one or more security-related updates.


Subversion Project reports :

Using the Serf RA layer of Subversion for HTTPS uses the apr_fnmatch API to handle matching wildcards in certificate Common Names and Subject Alternate Names. However, apr_fnmatch is not designed for this purpose. Instead it is designed to behave like common shell globbing.
In particular this means that '*' is not limited to a single label within a hostname (i.e. it will match '.'). But even further apr_fnmatch supports '?' and character classes (neither of which are part of the RFCs defining how certificate validation works).

Subversion stores cached credentials by an MD5 hash based on the URL and the authentication realm of the server the credentials are cached for. MD5 has been shown to be subject to chosen plaintext hash collisions. This means it may be possible to generate an authentication realm which results in the same MD5 hash for a different URL.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 77125

File Name: freebsd_pkg_83a418cc218211e4802c20cf30e32f6d.nasl

Version: 1.6

Type: local

Published: 8/12/2014

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 4.7


Risk Factor: Medium

Base Score: 4

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:subversion, p-cpe:/a:freebsd:freebsd:subversion16, p-cpe:/a:freebsd:freebsd:subversion17, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/11/2014

Vulnerability Publication Date: 8/6/2014

Reference Information

CVE: CVE-2014-3522, CVE-2014-3528