This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Two vulnerabilities have been reported in Ruby, which can be exploited
by malicious people to bypass certain security restrictions.
- An error in the handling of the 'alias' functionality can be
exploited to bypass the safe level protection and replace methods
called in the trusted level.
- An error caused due to directory operations not being properly
checked can be exploited to bypass the safe level protection and close
untainted directory streams.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 6.4
Public Exploit Available : false