This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
A Secunia Advisory reports :
The vulnerability is caused due to a boundary error within the redir()
function in check_http.c when processing HTTP Location : header
information. This can be exploited to cause a buffer overflow by
returning an overly long string in the 'Location:' header to a
See also :
Update the affected package.
Risk factor :
Medium / CVSS Base Score : 6.8