This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Secunia reports :
Tobias Klein has reported some vulnerabilities in Amarok, which
potentially can be exploited by malicious people to compromise a
Two integer overflow errors exist within the 'Audible::Tag::readTag()'
function in src/metadata/audible/audibletag.cpp. These can be
exploited to cause heap-based buffer overflows via specially crafted
Audible Audio files.
Two errors within the 'Audible::Tag::readTag()' function in
src/metadata/audible/audibletag.cpp can be exploited to corrupt
arbitrary memory via specially crafted Audible Audio files.
See also :
Update the affected package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 35999 (freebsd_pkg_6bb6188c17b211deae4d0030843d3802.nasl)
Bugtraq ID: 33210
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now