This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
MySQL have some vulnerabilities, which can be exploited by malicious
users to disclose potentially sensitive information and compromise a
1) An error within the code that generates an error response to an
invalid COM_TABLE_DUMP packet can be exploited by an authenticated
client to disclosure certain memory content of the server process.
2) A boundary error within the handling of specially crafted invalid
COM_TABLE_DUMP packets can be exploited by an authenticated client to
cause a buffer overflow and allows arbitrary code execution.
3) An error within the handling of malformed login packets can be
exploited to disclosure certain memory content of the server process
in the error messages.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 21633 (freebsd_pkg_4913886ce87511dab9f400123ffe8333.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now