This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
Secunia reports :
Spike Spiegel has discovered a vulnerability in Ganglia which can be
exploited by malicious people to compromise a vulnerable system. The
vulnerability is caused due to a boundary error within the
process_path function in gmetad/server.c. This can be exploited to
cause a stack-based buffer overflow by e.g. sending a specially
crafted message to the gmetad service.
The vulnerability is confirmed in version 3.1.1. Other versions may
also be affected.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5