This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Natanael Copa reports that dnrd is vulnerable to a remote buffer
overflow and a remote stack overflow. These vulnerabilities can be
triggered by sending invalid DNS packets to dnrd.
The buffer overflow could potentially be used to execute arbitrary
code with the permissions of the dnrd daemon. Note that dnrd runs in
an chroot environment and runs as non-root.
The stack overflow vulnerability can cause dnrd to crash.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 19358 (freebsd_pkg_e72fd82bfa0111d9bc080001020eed82.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now