This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Luigi Auriemma reports that peercast is vulnerable to a buffer
overflow which could lead to a DoS or potentially remote code
The handshakeHTTP function which handles all the requests received by
the other clients is vulnerable to a heap overflow which allows an
attacker to fill the loginPassword and loginMount buffers located in
the Servent class with how much data he wants.
See also :
Update the affected package.
Risk factor :
Critical / CVSS Base Score : 10.0