This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
A Debian advisory reports :
James Ranson discovered that an attacker can modify the referrer
setting with a carefully crafted URL by accidentally overwriting a
Tavis Ormandy from the Gentoo Security Team discovered several heap
corruptions due to inconsistent use of an internal function that can
crash the daemon or possibly lead to the execution of arbitrary code.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19042 (freebsd_pkg_97edf5abb31911d9837d000e0c2e438a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now