This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Caused by improper bounds-checking of username and password in the C2S
module, it is possible for an attacker to cause a remote buffer
overflow. The server directly handles the userinput with SQL backend
functions - malicious input may lead to buffer overflow.
See also :
Update the affected package.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 18936 (freebsd_pkg_553224e7432511d9a3d5000c6e8f12ef.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now