This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Some vulnerabilities have been reported in DokuWiki, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
potentially compromise a vulnerable system.
Input passed to the 'w' and 'h' parameters in lib/exec/fetch.php is
not properly sanitised before being passed as resize parameters to the
'convert' application. This can be exploited to cause a DoS due to
excessive CPU and memory consumption by passing very large numbers, or
to inject arbitrary shell commands by passing specially crafted
strings to the 'w' and 'h' parameter.
Successful exploitation requires that the '$conf[imconvert]' option is
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 22489 (freebsd_pkg_450b76ee506811dba5ae00508d6a62df.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now