This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
securityfocus reports :
An attacker with local access could potentially exploit this issue to
perform symbolic-link attacks, overwriting arbitrary files in the
context of the affected application.
Successfully mounting a symlink attack may allow the attacker to
delete or corrupt sensitive files, which may result in a denial of
service. Other attacks may also be possible.
Verlihub is prone to a remote command-execution vulnerability because
it fails to sufficiently validate user input.
Successfully exploiting this issue would allow an attacker to execute
arbitrary commands on an affected computer in the context of the
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 35336 (freebsd_pkg_58997463e01211dda7650030843d3802.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now