This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
A vulnerability has been reported in the Courier Authentication
Library, which can be exploited by malicious people to conduct SQL
Input passed via e.g. the username to the library is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code and e.g.
potentially bypass authentication.
Successful exploitation requires that a MySQL database is used for
authentication and that a Non-Latin character set is selected.
See also :
Update the affected package.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 33186 (freebsd_pkg_022baf7138e611dd8d3400e0815b8da8.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now