This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
ntp.org reports :
Unrestricted access to the monlist feature in ntp_request.c in ntpd in
NTP before 4.2.7p26 allows remote attackers to cause a denial of
service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2)
REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013
Use noquery to your default restrictions to block all status queries.
Use disable monitor to disable the ``ntpdc -c monlist'' command while
still allowing other status queries.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true