This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
A Project cURL Security Advisory reports :
libcurl uses the given file part of a TFTP URL in a manner that allows
a malicious user to overflow a heap-based memory buffer due to the
lack of boundary check.
This overflow happens if you pass in a URL with a TFTP protocol prefix
('tftp://'), using a valid host and a path part that is longer than
The affected flaw can be triggered by a redirect, if curl/libcurl is
told to follow redirects and an HTTP server points the client to a
tftp URL with the characteristics described above.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5