This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Multiple vulnerabilities have been reported in
RealPlayer/RealOne/HelixPlayer, which can be exploited by malicious
people to compromise a user's system.
An input validation error when processing .RA/.RAM files can be
exploited to cause a heap corruption via a specially crafted .RA/.RAM
file with an overly large size field in the header.
An error in the processing of .PLS files can be exploited to cause a
memory corruption and execute arbitrary code via a specially crafted
An input validation error when parsing .SWF files can be exploited to
cause a buffer overflow via a specially crafted .SWF file with
malformed record headers.
A boundary error when processing rm files can be exploited to cause a
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 29866 (freebsd_pkg_f762ccbbbaed11dca302000102cc8983.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now