This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Will Drewry has reported some vulnerabilities in Cscope, which
potentially can be exploited by malicious people to compromise a
Various boundary errors within the parsing of file lists or the
expansion of environment variables can be exploited to cause
stack-based buffer overflows when parsing specially crafted
'cscope.lists' files or directories.
A boundary error within the parsing of command line arguments can be
exploited to cause a stack-based buffer overflow when supplying an
overly long 'reffile' argument.
Successful exploitation may allow execution of arbitrary code.
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 5.1
CVSS Temporal Score : 3.8
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 22517 (freebsd_pkg_74ff10f6520f11db8f1a000a48049292.nasl)
CVE ID: CVE-2006-4262
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now