This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Shaun Colley reports :
When generating error and warning messages, picasm copies strings into
fixed length buffers without bounds checking.
If an attacker could trick a user into assembling a source file with a
malformed 'error' directive, arbitrary code could be executed with the
privileges of the user. This could result in full system compromise.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.1
CVSS Temporal Score : 4.2
Public Exploit Available : true