This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Werner Koch of the GNU project reports :
Noteworthy changes in version 1.5.3 :
Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA
Note that Libgcrypt is used by GnuPG 2.x and thus this release fixes
the above problem. The fix for GnuPG less than 2.0 can be found in the
just released GnuPG 1.4.14.
See also :
Update the affected packages.
Risk factor :
Low / CVSS Base Score : 1.9
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 69396 ()
CVE ID: CVE-2013-4242
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.