Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69755
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: subversion
Summary:The remote host is missing an update to the system; as announced in the referenced advisory.
Description:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

subversion
subversion-freebsd

CVE-2011-1752
The mod_dav_svn module for the Apache HTTP Server, as distributed in
Apache Subversion before 1.6.17, allows remote attackers to cause a
denial of service (NULL pointer dereference and daemon crash) via a
request for a baselined WebDAV resource, as exploited in the wild in
May 2011.
CVE-2011-1783
The mod_dav_svn module for the Apache HTTP Server, as distributed in
Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz
short_circuit option is enabled, allows remote attackers to cause a
denial of service (infinite loop and memory consumption) in
opportunistic circumstances by requesting data.
CVE-2011-1921
The mod_dav_svn module for the Apache HTTP Server, as distributed in
Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz
short_circuit option is disabled, does not properly enforce
permissions for files that had been publicly readable in the past,
which allows remote attackers to obtain sensitive information via a
replay REPORT operation.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1752
1025617
http://www.securitytracker.com/id?1025617
44633
http://secunia.com/advisories/44633
44681
http://secunia.com/advisories/44681
44849
http://secunia.com/advisories/44849
44879
http://secunia.com/advisories/44879
44888
http://secunia.com/advisories/44888
45162
http://secunia.com/advisories/45162
48091
http://www.securityfocus.com/bid/48091
APPLE-SA-2012-02-01-1
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
DSA-2251
http://www.debian.org/security/2011/dsa-2251
FEDORA-2011-8341
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062211.html
FEDORA-2011-8352
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061913.html
MDVSA-2011:106
http://www.mandriva.com/security/advisories?name=MDVSA-2011:106
RHSA-2011:0861
http://www.redhat.com/support/errata/RHSA-2011-0861.html
RHSA-2011:0862
http://www.redhat.com/support/errata/RHSA-2011-0862.html
USN-1144-1
http://www.ubuntu.com/usn/USN-1144-1
http://subversion.apache.org/security/CVE-2011-1752-advisory.txt
http://support.apple.com/kb/HT5130
http://svn.apache.org/repos/asf/subversion/tags/1.6.17/CHANGES
https://bugzilla.redhat.com/show_bug.cgi?id=709111
oval:org.mitre.oval:def:18922
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18922
Common Vulnerability Exposure (CVE) ID: CVE-2011-1783
1025618
http://www.securitytracker.com/id?1025618
http://subversion.apache.org/security/CVE-2011-1783-advisory.txt
https://bugzilla.redhat.com/show_bug.cgi?id=709112
oval:org.mitre.oval:def:18889
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18889
Common Vulnerability Exposure (CVE) ID: CVE-2011-1921
1025619
http://www.securitytracker.com/id?1025619
http://subversion.apache.org/security/CVE-2011-1921-advisory.txt
https://bugzilla.redhat.com/show_bug.cgi?id=709114
oval:org.mitre.oval:def:18999
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18999
subversion-control-rules-info-disc(67804)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67804
CopyrightCopyright (C) 2011 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.