This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Multiple vulnerabilities had been reported in various versions of
- The EXECUTE restrictions can be bypassed by using the AGGREGATE
function, which is missing a permissions check.
- A buffer overflow exists in gram.y which could allow an attacker to
execute arbitrary code by sending a large number of arguments to a
refcursor function, found in gram.y
- The intagg contributed module allows an attacker to crash the server
(Denial of Service) by constructing a malicious crafted array.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 22210 (freebsd_pkg_65c8ecf92adb11dba6e2000e0c2e438a.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now