This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Multiple vulnerabilities have been found in PHP, including : buffer
overflows, stack overflows, format string, and information disclosure
The session extension contained safe_mode and open_basedir bypasses,
but the FreeBSD Security Officer does not consider these real security
vulnerabilities, since safe_mode and open_basedir are insecure by
design and should not be relied upon.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 24365 (freebsd_pkg_7fcf1727be7111dbb2ec000c6ec775d9.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now