This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
A HexView security advisory reports :
When zip performs recursive folder compression, it does not check for
the length of resulting path. If the path is too long, a buffer
overflow occurs leading to stack corruption and segmentation fault. It
is possible to exploit this vulnerability by embedding a shellcode in
directory or file name. While the issue is not of primary concern for
regular users, it can be critical for environments where zip archives
are re-compressed automatically using Info-Zip application.
See also :
Update the affected package.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false