This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Gld has been found vulnerable to multiple buffer overflows as well as
multiple format string vulnerabilities.
An attacker could exploit this vulnerability to execute arbitrary code
with the permissions of the user running Gld, the default user being
The FreeBSD port defaults to running gld as the root user. The risk of
exploitation can be minimized by making gld listen on the loopback
address only, or configure it to only accept connections from trusted
See also :
Update the affected package.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 18974 (freebsd_pkg_6c2d4f29af3e11d9837d000e0c2e438a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now