This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote server is affected by a buffer overflow vulnerability.
The version of Zend's Session Clustering daemon on the remote host
contains a buffer overflow that can be exploited by an attacker using
a specially crafted session id to crash the affected service and even
execute arbitrary code subject to the permissions of the user id
See also :
Upgrade to Zend Platform version 2.2.1a or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.4
Public Exploit Available : false