This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
A vulnerability has been reported in Netatalk, which potentially can
be exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the papd daemon improperly
sanitising several received parameters before passing them in a call
to popen(). This can be exploited to execute arbitrary commands via a
specially crafted printing request.
Successful exploitation requires that a printer is configured to pass
arbitrary values as parameters to a piped command.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true