Lucene search

K
freebsdFreeBSDF8A913CC-1322-11E3-8FFA-20CF30E32F6D
HistoryAug 30, 2013 - 12:00 a.m.

svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack.

2013-08-3000:00:00
vuxml.freebsd.org
26

0.0004 Low

EPSS

Percentile

5.2%

Subversion Project reports:

svnserve takes a --pid-file option which creates a file containing the
process id it is running as. It does not take steps to ensure that the file
it has been directed at is not a symlink. If the pid file is in a directory
writeable by unprivileged users, the destination could be replaced by a
symlink allowing for privilege escalation. svnserve does not create a pid
file by default.
All versions are only vulnerable when the --pid-file=ARG option is used.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsubversion= 1.4.0UNKNOWN
FreeBSDanynoarchsubversion< 1.6.23_2UNKNOWN

0.0004 Low

EPSS

Percentile

5.2%