This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
SecurityTracker reports :
A vulnerability was reported in FreeType. A remote user can cause
arbitrary code to be executed on the target user's system.
A remote user can create a specially crafted font file that, when
loaded by the target user's system, will trigger an integer underflow
or integer overflow and crash the application or execute arbitrary
code on the target system.
Chris Evans reported these vulnerabilities.
Impact: A remote user can create a file that, when loaded by the
target user, will execute arbitrary code on the target user's system.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.5
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 22503 (freebsd_pkg_b975763f521011db8f1a000a48049292.nasl)
Bugtraq ID: 18034
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now