This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
The nginx project reports :
A bug in the experimental SPDY implementation in nginx 1.5.10 was
found, which might allow an attacker to corrupt worker process memory
by using a specially crafted request, potentially resulting in
arbitrary code execution (CVE-2014-0088).
The problem only affects nginx 1.5.10 on 32-bit platforms, compiled
with the ngx_http_spdy_module module (which is not compiled by
default), if the 'spdy' option of the 'listen' directive is used in a
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 72849 ()
CVE ID: CVE-2014-0088
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.